Authentication and Authorisation for a Personal Distributed Environment.
Tracy McKayJames IrvinePublished in: VTC Spring (2007)
Keyphrases
- distributed environment
- distributed systems
- distributed databases
- distributed data mining
- distributed computing
- intelligent agents
- security policies
- peer to peer
- distributed data sources
- highly distributed
- security requirements
- biometric authentication
- user authentication
- personal information
- cooperative
- distributed computing environment
- peer to peer networks
- database
- security analysis
- query routing
- security model
- e learning
- multimedia
- geographically distributed
- load balancing
- database systems
- information resources