Computer Science
Access Control
37%
Access Control System
25%
Anti-Spam
25%
Certificate Chain
25%
Cloud Service Provider
25%
Commercial off the Shelf
31%
Component Failure
31%
Computing Environment
50%
Criminal Hacker
25%
Critical System
68%
Customer Profile
25%
Data Sharing
32%
digital right management
25%
Distributed Computing Environment
31%
Distributed Systems
43%
Enterprise Network
25%
Fine Granularity
50%
Hybrid Solution
25%
Hypervisor
30%
Identity Information
25%
Individual Function
25%
Individual User
56%
Information Infrastructure
25%
Integrity Verification
50%
Interdependence
31%
Interdependency
50%
Key Management
25%
Key Management Scheme
25%
Laboratory Experiment
25%
Messaging Service
50%
Messaging System
25%
Network Environment
25%
Network Service
39%
Online Social Networks
50%
Profile Data
25%
Public Cloud
50%
Quantitative Research
25%
Revocation List
25%
Role-Based Access Control
100%
Secure Communication
25%
Security Policy
25%
Sensitive Informations
32%
Signature Scheme
25%
Single Message
25%
Software Component
50%
Survivability Model
39%
Technical Requirement
25%
Technical Vulnerability
25%
Testing Component
50%
Theoretic Approach
53%
Keyphrases
Abnormality Detection
25%
Anti-spam
25%
Attack Response
25%
Attribute Certificates
25%
Binding Mechanism
25%
Certificate Chain
25%
Certificate Revocation
25%
Component Failure
25%
Component Sharing
25%
Consumer Data
25%
Cooperative Attack
25%
Digital Rights Management
25%
Dynamic Recovery
25%
Enterprise Instant Messaging
25%
Enterprise-wide Systems
25%
Game Model
25%
Hybrid Solutions
25%
Identity Certificate
25%
Immunization
25%
Information Sharing
25%
Infrastructure Protection
25%
Insider
25%
Interdependency
25%
IoT Computing
25%
Key Management Scheme
25%
Management Security
25%
Message Integrity
25%
Messaging System
25%
Mission-critical
31%
Online Advertising
25%
P2P Computing
25%
Problems Recommendation
25%
Profile Analysis
25%
Public Cloud
25%
Revocation List
25%
Role Information
25%
Role-based Access Control
25%
Scalable Approaches
25%
Secure Key Management
25%
Security Policy
25%
Simple Majority
25%
Simple Majority Rule
25%
Software Assurance
25%
Survivability Model
29%
Survivable Systems
25%
Testing Architecture
25%
Trusted Component
25%
User Identity
25%
User-Role Assignment
25%
Wearable IoT
25%