INIS
control
100%
data
69%
learning
56%
enforcement
51%
policy
49%
environment
47%
security
30%
management
29%
applications
26%
distribution
24%
resources
23%
authentication
21%
information systems
19%
design
18%
distance
16%
ports
16%
uptake
16%
architecture
15%
solutions
15%
values
12%
surveys
12%
schools
10%
engines
10%
control systems
9%
levels
9%
metrics
9%
risks
9%
protection
9%
validation
8%
space
8%
education
8%
algorithms
8%
modeling
8%
engineering
8%
interactions
8%
comparative evaluations
8%
internet
8%
clouds
8%
grids
8%
decision making
8%
patients
8%
ecosystems
8%
monitoring
8%
robots
8%
sensors
8%
vectors
8%
implementation
7%
tcp
6%
devices
6%
calculation methods
6%
Computer Science
Healthcare Information
40%
Information System
40%
Access Control
30%
e-learning
24%
Learning Objects
24%
Attackers
17%
Honeypots
16%
Authentication
16%
Distributed Environment
16%
Learning Management System
12%
Learning Experiences
12%
Learning Resource
10%
Internet of Things
8%
Open Standard
8%
Authorization Process
8%
Open Environment
8%
Control Requirement
8%
Contextual Data
8%
Access Control Decision
8%
Privacy Policies
8%
Attribute-Based Access Control
8%
Authorization Framework
8%
Authorization Service
8%
Policy Enforcement
8%
technology enhanced learning
8%
Wireless Communication
8%
Distributed Algorithm
8%
Centralized Approach
8%
Distributed Version
8%
Network Infrastructure
8%
Robot
8%
Traffic Analysis
8%
Personal Data
8%
Machine Learning Technique
8%
Data Privacy
8%
Business Ecosystem
8%
European Commission
8%
Distance Vector
8%
Collective Decision Making
8%
Communication Service
8%
Numerical Space
8%
Multiple Component
8%
Multiple Location
8%
Web Environment
8%
Government Program
8%
User Data
8%
Access Control System
5%
Keyphrases
Learning Objects
16%
Access Control
16%
Model-based Control
16%
Distribution Model
16%
E-learning Environment
16%
Widgets
16%
Distributed Healthcare
16%
Enforcement Models
16%
Usage Control
12%
Multi-location
12%
Web Environment
12%
Multiple Components
12%
Learning Management System
12%
Multiple Providers
12%
User Credentials
12%
Purpose Enforcement
10%
Usage Policy
10%
Learning Resources
10%
Data Usage
9%
Broker
9%
Heterogeneous IoT
8%
Privacy Policy
8%
Privacy Awareness
8%
Compromised Accounts
8%
Smart Home
8%
Health Information Systems
8%
Network Analytics
8%
Information Security Controls
8%
Risk-aware
8%
IoT Environment
8%
Centralized Approach
8%
Multi-authority
8%
Authorization Framework
8%
Attribute-based Authorization
8%
ICT in Schools
8%
Uptake of ICT
8%
Online Learning Community
8%
Policy Enforcement
8%
History Data
8%
Access History
8%
Contextual Data
8%
Protection System
8%
Distributed Algorithms
8%
Optimum Distance
8%
Routing Matrix
8%
Privacy-preserving
8%
Local Optimum
8%
Perimeter Security
8%
Routing Policy
8%
Haskell
8%