Login / Signup
Access control models for geo-social computing systems.
Ebrahim Tarameshloo
Philip W. L. Fong
Published in:
SACMAT (2014)
Keyphrases
</>
computing systems
access control models
access control
computer systems
privacy aware
role based access control
security issues
social media
personal information
database security
artificial intelligence
social networks
information systems
data security
data management
development process