Access control using threshold cryptography for ubiquitous computing environments.
Jalal Al-MuhtadiRaquel L. HillSumayah Al-RwaisPublished in: J. King Saud Univ. Comput. Inf. Sci. (2011)
Keyphrases
- access control
- ubiquitous computing environments
- security policies
- dynamic access control
- data security
- security requirements
- access control models
- security mechanisms
- access control policies
- ubiquitous computing
- information security
- context awareness
- context aware
- security model
- role based access control
- security management
- access control mechanism
- anomaly detection
- information systems
- end users
- query processing