Keyphrases
- access control
- trust management
- trust relationships
- security services
- public key infrastructure
- trust negotiation
- trust model
- intrusion detection
- trusted computing
- policy enforcement
- computer security
- information security
- security systems
- security issues
- security requirements
- security protocols
- statistical databases
- security mechanisms
- key management
- data security
- security model
- security policies
- security management
- privacy concerns
- network security
- elliptic curve
- security analysis
- security threats
- open systems
- virtual communities
- internet banking
- trust evaluation
- information sharing
- information systems