Access Control and Authentication for Converged Wireless Networks.
Zhi (Judy) FuJohn C. StrassnerPublished in: MobiQuitous (2006)
Keyphrases
- wireless networks
- access control
- security mechanisms
- identity management
- security requirements
- network access
- trust relationships
- dynamic access control
- wireless communication
- security policies
- data security
- ad hoc networks
- mobile computing
- rights management
- role based access control
- access control policies
- security analysis
- access control models
- security model
- access control mechanism