Security Policies Tuning Among IP Devices.
Simone FerraresiEmanuele FrancocciAlessio QuagliniFrancesco PicassoPublished in: KES (2) (2007)
Keyphrases
- security policies
- home network
- ubiquitous computing environments
- access control
- network security
- security management
- network management
- distributed systems
- security concerns
- mobile devices
- security requirements
- ip networks
- access control systems
- multilevel secure
- access control policies
- cyber attacks
- mobile ip
- smart phones
- data mining
- databases
- database