Don't Trust Your Roommate, or, Access Control and Replication Protocols in "Home" Environments.
Vassilios LekakisYunus BasagalarPete KeleherPublished in: HotStorage (2012)
Keyphrases
- access control
- home environments
- trust relationships
- access control models
- policy enforcement
- usage control
- home environment
- data security
- smart home
- daily activities
- security policies
- dynamic access control
- identity management
- role based access control
- trust model
- access control policies
- distributed databases
- access rights
- peer to peer
- security mechanisms
- access control mechanism
- text entry
- intelligent agents
- mobile phone
- database