Login / Signup
Extended Role-Based Security System Using Context Information.
Xun Li
Sang Bong Yoo
Published in:
FGCN (2) (2008)
Keyphrases
</>
key management
security threats
wireless sensor networks
security protocols
access control
information systems
network security
role assignment
data sets
third party
distributed environment
information security
security issues
security requirements
security management