Providing Secret Authentication in Clustered Security Architecture for Cloud-Based WBAN.
I KarthigaSharmila SankarPublished in: Comput. J. (2018)
Keyphrases
- security architecture
- security mechanisms
- security model
- access control
- security policies
- security analysis
- security requirements
- resource constrained
- cloud computing
- data mining
- simulation platform
- operating system
- security issues
- computer networks
- distributed databases
- data integrity
- intrusion detection system
- databases