Login / Signup

Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect.

Josef von HeldenIngo Bente
Published in: ISSE (2008)
Keyphrases
  • access control
  • trust relationships
  • wireless sensor networks
  • computer networks
  • peer to peer
  • network traffic
  • fine grained
  • data security
  • security model