Trust-enhanced Security in Location-based Adaptive Authentication
暂无分享,去创建一个
[1] Gabriele Lenzini,et al. Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems , 2006, MTW.
[2] Audun Jøsang,et al. Semantic Constraints for Trust Transitivity , 2005, APCCM.
[3] Alfons H. Salden,et al. Context sensitive access control , 2005, SACMAT '05.
[4] Roy H. Campbell,et al. Reasoning about Uncertain Contexts in Pervasive Computing Environments , 2004, IEEE Pervasive Comput..
[5] Joan Feigenbaum,et al. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.
[6] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[7] Lalana Kagal,et al. A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments , 2006, SEMWEB.
[8] Mel Siegel,et al. Sensor fusion using Dempster-Shafer theory II: static weighting and Kalman filter-like dynamic weighting , 2003, Proceedings of the 20th IEEE Instrumentation Technology Conference (Cat. No.03CH37412).
[9] Audun Jøsang,et al. Trust network analysis with subjective logic , 2006, ACSC.
[10] Jerry den Hartog,et al. Audit-based compliance control , 2007, International Journal of Information Security.
[11] Butler W. Lampson,et al. Authentication in distributed systems , 1993 .
[12] Adam L. Berger,et al. A Maximum Entropy Approach to Natural Language Processing , 1996, CL.
[13] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[14] Andrew W. Appel,et al. Proof-carrying authentication , 1999, CCS '99.
[15] Elisa Bertino,et al. A Trust-Based Context-Aware Access Control Model for Web-Services , 2004, Proceedings. IEEE International Conference on Web Services, 2004..
[16] Jie Yang,et al. Sensor Fusion Using Dempster-Shafer Theory , 2002 .
[17] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[18] Karl Krukow,et al. Towards a Theory of Trust for the Global Ubiquitous Computer , 2006 .
[19] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[20] Jürgen Bohn,et al. Robust Probabilistic Positioning based on High-Level Sensor-Fusion and Map Knowledge , 2003 .
[21] J.M. Bradshaw,et al. Context-based security management for multi-agent systems , 2005, IEEE 2nd Symposium on Multi-Agent Security and Survivability, 2005..
[22] Audun Jøsang,et al. A Subjective Metric of Authentication , 1998, ESORICS.
[23] Jie Yang,et al. Sensor fusion using Dempster-Shafer theory [for context-aware HCI] , 2002, IMTC/2002. Proceedings of the 19th IEEE Instrumentation and Measurement Technology Conference (IEEE Cat. No.00CH37276).