Login / Signup
A Security Model for Home Networks with Authority Delegation.
Jin-Bum Hwang
Jong Wook Han
Published in:
ICCSA (4) (2006)
Keyphrases
</>
security model
access control
security requirements
public key
security analysis
security policies
provably secure
designated verifier
fine grained
role based access control
conflict resolution
public key cryptography
databases
data warehouse
distributed systems
security mechanisms