Login / Signup
Privacy and Security Policy Choices in an NII Environment.
Willis H. Ware
Published in:
Cryptography: Policy and Algorithms (1995)
Keyphrases
</>
security policies
security concerns
access control
security management
ubiquitous computing environments
network security
security requirements
security measures
network management
anomaly detection
fine grained
privacy preserving
personal information
distributed systems
private information
data security
databases