Empowering mobile code using expressive security policies.
V. N. VenkatakrishnanRam PeriR. SekarPublished in: NSPW (2002)
Keyphrases
- security policies
- access control
- security management
- distributed systems
- network security
- security concerns
- security requirements
- access control systems
- mobile devices
- multilevel secure
- access control policies
- mobile phone
- mobile computing
- source code
- mobile applications
- databases
- mobile users
- mobile networks
- context aware
- home network
- database
- unauthorized access
- feature selection