Keyphrases
- security policies
- access control
- network security
- distributed systems
- security management
- security requirements
- security concerns
- network management
- access control systems
- home network
- ubiquitous computing environments
- security architecture
- access control policies
- xml access control
- database
- unauthorized access
- security measures
- anomaly detection
- data processing
- data mining
- databases