Keyphrases
- access control
- authentication and access control
- security policies
- fine grained
- virtual reality
- simulation environment
- public key infrastructure
- conflict resolution
- security requirements
- role assignment
- trust management
- usage control
- role based access control
- public key encryption
- information retrieval
- trust negotiation
- access control policies
- decision support
- wireless sensor networks
- artificial intelligence