Supporting reconfigurable security policies for mobile programs.
Brant HashiiScott MalabarbaRaju PandeyMatt BishopPublished in: Comput. Networks (2000)
Keyphrases
- security policies
- access control
- security management
- network security
- security concerns
- distributed systems
- mobile devices
- low cost
- security requirements
- access control systems
- mobile phone
- access control policies
- unauthorized access
- mobile applications
- computing environments
- mobile computing
- hardware implementation
- mobile users
- context aware
- mobile networks
- multilevel secure
- home network
- feature selection