Security Policy Checker and Generator for Java Mobile Codes.
Haruhiko KaiyaHitoshi FurukawaKenji KaijiriPublished in: Engineering Information Systems in the Internet Context (2002)
Keyphrases
- security policies
- access control
- network security
- security management
- security concerns
- security requirements
- mobile devices
- network access
- network management
- security architecture
- mobile users
- mobile phone
- distributed systems
- object oriented
- ubiquitous computing environments
- home network
- access control systems
- mobile applications
- mobile networks
- access control policies
- pervasive computing
- mobile computing
- event logs
- web services
- computing environments
- computer networks
- information security
- intrusion detection
- relational databases