Intelligent authentication, authorization, and administration (I3A).
Dan EigelesPublished in: Inf. Manag. Comput. Secur. (2006)
Keyphrases
- access control
- security requirements
- fine grained
- trust negotiation
- security mechanisms
- intelligent systems
- fragile watermarking
- decision support
- biometric authentication
- identity management
- artificial intelligence
- conflict resolution
- security policies
- authentication protocol
- user authentication
- trust relationships
- rbac model