Context-aware access control and anonymous authentication in WBAN.
Amel ArfaouiOmar Rafik Merad BoudiaAli KribecheSidi-Mohammed SenouciMohamed HamdiPublished in: Comput. Secur. (2020)
Keyphrases
- context aware
- access control
- security mechanisms
- identity management
- security requirements
- trust relationships
- contextual information
- mobile devices
- ubiquitous computing
- security policies
- context awareness
- dynamic access control
- data security
- ambient intelligence
- rights management
- context aware systems
- role based access control
- mobile computing
- mobile users
- access control policies
- pervasive computing
- security model
- ubiquitous computing environments
- mobile applications
- access control models
- peer to peer
- access control mechanism
- management system