Keyphrases
- security policies
- access control
- security management
- network security
- distributed systems
- security concerns
- network management
- security requirements
- security architecture
- access control systems
- unauthorized access
- ubiquitous computing environments
- access control policies
- security measures
- event logs
- home network
- intrusion detection
- ambient intelligence
- databases