Stop Unauthorized Access to Your Smart Devices.
Yutong LiuLinghe KongYifeng CaoVahan SarafianLong ChengGuihai ChenPublished in: ICPADS (2018)
Keyphrases
- smart devices
- unauthorized access
- access control
- embedded devices
- daily life
- intrusion detection system
- security policies
- smart phones
- ubiquitous computing
- file system
- sensitive data
- smart environments
- mobile phone
- intrusion detection
- service providers
- mobile devices
- context awareness
- network security
- data sharing
- embedded systems
- copyright protection
- databases
- data storage
- database
- third party
- context aware
- distributed systems
- flash memory
- management system
- database systems