Computer Science
Access Control
100%
Role-Based Access Control
89%
Access Control Policies
75%
Android
45%
Security Requirements
41%
Online Social Networks
40%
Cloud Computing
37%
Attackers
35%
Case Study
34%
Malware
34%
Identity Management
32%
Experimental Result
29%
Access Management
28%
Based Delegation
27%
Security Policy
27%
Authorization Policy
26%
Firewall
25%
Social Network
23%
Software-Defined Network
22%
Data Sharing
21%
Authorization Framework
20%
Web Application
19%
Software-Defined Networking
19%
Information Assurance
19%
Resource Sharing
18%
role-based access control model
17%
Security and Privacy
17%
Authentication
17%
Botnets
17%
Federated Identity
17%
Phishing Attack
17%
Operating System
17%
Attribute-Based Access Control
17%
Honeypots
15%
Phishing Website
15%
Management Framework
15%
Ontology
15%
Web Service
15%
Mobile Application
15%
Security Mechanism
14%
Integrity Verification
13%
Moving Target Defense
13%
Certification Process
13%
Cryptography
13%
Trust Management
13%
Critical Infrastructure
13%
Privacy Concern
13%
Security Framework
13%
Information Technology
12%
Virtualizations
12%
Keyphrases
Role-based Access Control
84%
Role-based
59%
Access Control
59%
Access Control Policy
40%
Online Social Networks
37%
Security Requirements
35%
World Wide Web
34%
Authorization Constraints
31%
Software-defined Networking
29%
Role-based Authorization
29%
Attacker
29%
Access Management
28%
Privacy Concerns
28%
Security Policy
27%
Authorization Policy
26%
Firewall
26%
Prototype Concepts
26%
Vulnerability
26%
Phishing
25%
Cloud Computing
23%
Concept Implementation
23%
Malware
23%
Information Sharing
22%
Security Issues
22%
Policy Analysis
21%
Energy Supply System
20%
Policy-based
19%
Android
18%
Information Assurance
18%
Mobile Application
18%
Revocation
18%
Authorization Framework
18%
Access Control Model
17%
Web Application
17%
Resource Sharing
17%
Federated Identity Management
17%
Forensic
16%
Attribute-based Access Control
16%
Adversary
16%
Policy Failure
16%
Management Framework
16%
Honeypot
15%
Electronic Health Records
15%
Web Services
15%
Security Mechanism
15%
Risk-aware
15%
Security Privacy
14%
Anti-phishing
14%
Administrators
14%
Security Framework
14%