Keyphrases
- access control
- security issues
- security requirements
- information security
- intrusion detection
- security policies
- low cost
- network services
- security systems
- computer security
- information assurance
- mobile devices
- security threats
- security properties
- wireless sensor
- statistical databases
- network security
- mobile agent system
- functional requirements
- data integrity
- security model
- sensitive data
- rfid tags
- security problems
- social networking
- security management
- security measures
- power consumption