Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
Aditi GuptaMarkus MiettinenN. AsokanMarcin NagyPublished in: SocialCom/PASSAT (2012)
Keyphrases
- security policies
- mobile devices
- context aware
- network security
- access control
- ubiquitous computing environments
- security management
- context sensitive
- mobile computing
- mobile applications
- home network
- security concerns
- access control policies
- context awareness
- mobile users
- ambient intelligence
- mobile phone
- distributed systems
- dimensionality reduction