Voice authentication embedded solution for secured access control.
Jakub GalkaMariusz MasiorMichal SalasaPublished in: IEEE Trans. Consumer Electron. (2014)
Keyphrases
- access control
- security mechanisms
- identity management
- access control mechanism
- fine grained
- dynamic access control
- security policies
- security requirements
- data security
- access control policies
- trust relationships
- role assignment
- access control models
- role based access control
- security model
- database security
- rights management
- access control systems
- security analysis
- information security