Authentication and services access control in a cooperative ad hoc environment.
Hassnaa MoustafaGilles BourdonPublished in: BROADNETS (2008)
Keyphrases
- access control
- identity management
- trust relationships
- security mechanisms
- fine grained
- role assignment
- data security
- access control mechanism
- ubiquitous computing environments
- security policies
- security requirements
- dynamic access control
- security architecture
- access control policies
- directory service
- access control models
- network access
- role based access control
- personal information
- service providers
- database security
- security model
- service oriented
- access control systems
- database systems
- multi agent systems
- rbac model
- cloud computing
- context aware
- resource constrained
- security analysis