Context-aware security service in RFID/USN environments using MAUT and extended GRBAC
暂无分享,去创建一个
Sungik Jun | Mokdong Chung | Seokhwan Yang | Kiyeal Lee | Sungik Jun | Mokdong Chung | Seokhwan Yang | Kiyeal Lee
[1] Mustaque Ahamad,et al. A context-aware security architecture for emerging applications , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[2] Mustaque Ahamad,et al. Generalized Role-Based Access Control for Securing Future Applications , 2000 .
[3] Teuvo Kohonen,et al. Self-Organizing Maps , 2010 .
[4] H. Raiffa,et al. Decisions with Multiple Objectives , 1993 .
[5] Ross J. Anderson,et al. Robustness Principles for Public Key Protocols , 1995, CRYPTO.
[6] Guanling Chen,et al. A Survey of Context-Aware Mobile Computing Research , 2000 .
[7] F. B. Vernadat,et al. Decisions with Multiple Objectives: Preferences and Value Tradeoffs , 1994 .
[8] Alfred C. Weaver,et al. A Dynamic, Context-Aware Security Infrastructure , 2004 .
[9] Mustaque Ahamad,et al. Generalized role-based access control , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[10] Music Musi. Georgia Institute of Technology , 2002 .
[11] R. L. Keeney,et al. Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.
[12] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[13] Gregory D. Abowd,et al. Providing architectural support for building context-aware applications , 2000 .
[14] John B. Kidd,et al. Decisions with Multiple Objectives—Preferences and Value Tradeoffs , 1977 .
[15] William Stallings,et al. Cryptography and network security , 1998 .