Designing Secured Services for Authentication, Authorization, and Accounting of Users (short paper).
Denys ShevchukOleh HarasymchukAndrii PartykaNataliia KorshunPublished in: CPITS II (2023)
Keyphrases
- access control mechanism
- access control
- end users
- trust relationships
- mobile services
- user centric
- identity management
- service providers
- security policies
- mobile applications
- smart phones
- web environment
- information resources
- user interaction
- location information
- mobile phone users
- online services
- web services
- service oriented
- value added services
- social media
- user groups
- security requirements
- access control policies
- personal data
- recommender systems
- collaborative filtering
- user privacy
- user interface
- personal preferences
- rapidly in recent years
- trust negotiation
- user requests
- role based access control
- information services
- context aware
- mobile phone
- mobile devices