Keyphrases
- computing environments
- trusted computing
- mobile environments
- information security
- access control
- grid computing
- mobile agents
- intrusion detection
- low bandwidth
- security requirements
- service discovery
- distributed computing environment
- mobile computing
- computer security
- security mechanisms
- computing platform
- pervasive computing environments
- pervasive computing
- high performance computing
- security issues
- security policies
- network security
- key management
- statistical databases
- mobile devices