Proxy-Based Security Audit System for Remote Desktop Access.
Shi-hai HuangChuang LinAn'an LuoZhen ChenXin JiangKai WangHui ZhangXuehai PengPublished in: ICCCN (2009)
Keyphrases
- access control
- intrusion detection
- privacy enhancing
- remote access
- information security
- access requests
- network access
- java applet
- security policies
- remote server
- network security
- security issues
- sys tems
- personal digital assistants
- real time
- user interface
- ring signature scheme
- role based access control
- key management
- situational awareness
- security requirements
- video conferencing
- personal information
- wireless networks
- data mining techniques
- security model
- security protocols
- trusted third party
- database systems
- data mining