Secure Sharing of Tuple Spaces in Ad Hoc Settings.
Radu HandoreanGruia-Catalin RomanPublished in: Electron. Notes Theor. Comput. Sci. (2003)
Keyphrases
- information sharing
- security requirements
- covert channel
- security mechanisms
- multiple users
- secure information sharing
- user authentication
- authentication protocol
- share information
- security issues
- data sharing
- lightweight
- neural network
- databases
- data sets
- user defined
- standard model
- case study
- cryptographic protocols
- authentication scheme
- identity management
- security measures
- data encryption