Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover.
Ulrike MeyerSusanne WetzelPublished in: PerCom Workshops (2006)
Keyphrases
- information security
- network security
- security systems
- access control
- security issues
- computer security
- contextual information
- statistical databases
- intrusion detection
- security requirements
- security management
- key management
- security properties
- security measures
- data mining
- security problems
- user authentication
- security analysis
- functional requirements
- context aware