iVoyeur: Packet-Level, Per-User Network Access Control and Monitoring.
Dave JosephsenPublished in: login Usenix Mag. (2009)
Keyphrases
- access control
- fine grained
- dynamic access control
- security policies
- data security
- security architecture
- trust relationships
- identity management
- network management
- access control policies
- access control models
- role based access control
- wireless sensor networks
- user centric
- end users
- role based access control model
- computer networks
- ip address
- usage control
- heterogeneous networks
- security mechanisms
- relational databases
- security model
- query processing