Security from the transparent computing aspect.
Guojun WangQin LiuYang XiangJianer ChenPublished in: ICNC (2014)
Keyphrases
- information security
- access control
- intrusion detection
- network security
- security issues
- security requirements
- security systems
- database
- search engine
- security policies
- security properties
- security threats
- information assurance
- security vulnerabilities
- security management
- wireless sensor networks
- social networks
- information retrieval