A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices.
Wassim ItaniAyman I. KayssiAli ChehabCamille GaspardPublished in: Int. J. Netw. Secur. (2006)
Keyphrases
- security protocols
- wireless devices
- processing power
- distributed environment
- mobile applications
- mobile phone
- wifi
- mobile devices
- intrusion detection
- security mechanisms
- access control
- data mining techniques
- high bandwidth
- wireless technologies
- wireless channels
- key management
- computing power
- security requirements
- rfid tags
- desktop computers
- wireless networks
- limited resources
- data transmission
- embedded systems
- computing environments