Keyphrases
- security policies
- access control
- distributed systems
- security management
- security concerns
- network security
- security requirements
- network management
- access control systems
- ubiquitous computing environments
- security architecture
- fine grained
- access control policies
- event logs
- security measures
- home network
- information systems
- database
- data processing
- mobile devices