Seamless Object Authentication in Different Security Policy Domains.
Satoru TezukaRyôichi SasakiMasanori KataokaPublished in: HICSS (2000)
Keyphrases
- security policies
- security requirements
- access control
- security management
- network security
- security concerns
- distributed systems
- network management
- real world
- security analysis
- security architecture
- cross domain
- security mechanisms
- ubiquitous computing environments
- home network
- fine grained
- data processing
- access control systems
- network access