Distributed device networks with security constraints.
Yuefei XuRonggong SongLarry KorbaLihui WangWeiming ShenSherman Y. T. LangPublished in: IEEE Trans. Ind. Informatics (2005)
Keyphrases
- meeting scheduling
- computer networks
- distributed systems
- remote server
- distributed constraint optimization problems
- peer to peer networks
- distributed environment
- heterogeneous networks
- cooperative
- information security
- security issues
- statistical databases
- social networks
- constrained optimization
- communication cost
- intrusion detection
- distributed constraint satisfaction
- key management
- distributed multimedia
- structured peer to peer
- security requirements
- security policies
- network security
- lightweight
- rfid tags
- distributed data
- computing environments
- wide area network
- constraint programming
- data acquisition
- mobile agents
- enterprise network
- access control
- multi agent