Keyphrases
- security policies
- mobile devices
- network management
- security management
- access control
- network security
- distributed systems
- dacs scheme
- security requirements
- management system
- access control systems
- mobile phone
- access control policies
- security concerns
- knowledge management
- multilevel secure
- mobile learning
- mobile technologies
- role based access control
- mobile users
- mobile applications
- information systems
- mobile computing
- smart phones
- database
- workflow management systems
- fine grained
- data management
- database systems
- service platform
- machine learning
- home network
- data mining
- unauthorized access
- real world