Access security in CDMA2000, including a comparison with UMTS access security.
Greg RoseGeir M. KøienPublished in: IEEE Wirel. Commun. (2004)
Keyphrases
- access control
- security architecture
- access requests
- intrusion detection
- data security
- security policies
- security issues
- sys tems
- information security
- statistical databases
- security requirements
- security mechanisms
- access control systems
- security analysis
- access control mechanism
- role based access control
- network access
- multiple users
- data protection
- situational awareness
- database systems
- encryption scheme
- base station
- sensor networks