Keyphrases
- user authentication
- access control
- intrusion detection
- security policies
- information security
- information assurance
- security mechanisms
- security systems
- network security
- security issues
- security requirements
- security threats
- data security
- high security
- security measures
- role based access control
- security level
- lightweight
- website
- key agreement protocol
- mobile devices
- security protocols
- computer security
- information systems
- statistical databases
- intrusion detection system