Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…RBAC allows users to access information related to the specific roles that they have been assigned. In real-life settings, RBAC may not be appropriate because of conflicts that may occur between roles [2][3][4][5]. The characteristics, merits, and demerits of access control techniques are set forth in Table 1.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…RBAC allows users to access information related to the specific roles that they have been assigned. In real-life settings, RBAC may not be appropriate because of conflicts that may occur between roles [2][3][4][5]. The characteristics, merits, and demerits of access control techniques are set forth in Table 1.…”
Section: Related Workmentioning
confidence: 99%
“…General wireless security threats that may occur in business and social life using mobile devices include rogue evil twin APs, ad hoc networks, RF jamming, deauthentication, MAC spoofing, WEP key cracking, and sniffing [1,2]. Table 2 classifies wireless security threats with respect to confidentiality, integrity, and availability (three elements of security) that may occur in business and social life using mobile devices.…”
Section: Threats In Wireless Securitymentioning
confidence: 99%
See 3 more Smart Citations