Keyphrases
- access control
- security mechanisms
- security issues
- intrusion detection
- security services
- security requirements
- information security
- network security
- security policies
- security problems
- mechanism design
- policy enforcement
- security threats
- security systems
- security protocols
- resource constrained
- integrity constraints
- defense mechanisms
- encryption scheme
- computer security
- data security
- database
- sensitive data
- network management