Towards Provable Security for Ubiquitous Applications.
Mike BurmesterTri Van LeBreno de MedeirosPublished in: ACISP (2006)
Keyphrases
- intrusion detection
- information security
- security systems
- security issues
- ubiquitous computing
- security requirements
- statistical databases
- information assurance
- security management
- security problems
- computer security
- security policies
- network security
- context aware
- access control
- network management
- key management
- information sharing
- security level
- context awareness
- risk assessment
- functional requirements
- security mechanisms
- security protocols
- rfid technology
- security model
- neural network