Keyphrases
Security Privacy
100%
Access Control Mechanism
100%
Security Enhancement
100%
Privacy Enhancement
100%
Trust-based Access Control
100%
Ubiquitous Systems
100%
Ubiquitous Computing
50%
Process Evaluation
50%
Security Requirements
50%
Access Control
50%
User Device
50%
Pervasive Computing Environment
50%
Trust Evaluation
50%
Unpredictable Changes
50%
Tuning Parameter
50%
Trust Relationship
50%
Dynamic Aspect
50%
Security Policy
50%
Service Provision
50%
Information Security Controls
50%
Peer Recommendation
50%
Physical Location
50%
Pervasive Services
50%
Privacy Requirements
50%
User System
50%
Computer Science
Security and Privacy
100%
Access Control
100%
Access Control Policies
100%
Ubiquitous Computing
50%
Computing Environment
50%
Security Requirements
50%
Security Policy
50%
pervasive computing environment
50%
Service Session
50%
Trust Relationship
50%
Service Provision
50%
Privacy Requirement
50%
Physical Location
50%
Interacting Entity
50%