A Flexible and Secure Access Control Scheme Using Social Behavior in the Real World
暂无分享,去创建一个
Norio Shiratori | Gen Kitagata | Atsushi Takeda | Debasish Chakraborty | Kazuo Hashimoto | Satoshi Ogawa
[1] Jorge R. Manjarrez Sanchez,et al. Design of a VoiceXML Gateway , 2003, ENC.
[2] Mao Bi,et al. Role based Access Control Model , 2003 .
[3] Mohsen Jamali,et al. Different Aspects of Social Network Analysis , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06).
[4] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[5] Michael S. H. Heng,et al. An Empirical Study on Voice-Enabled Web Applications , 2006, IEEE Pervasive Computing.
[6] Kenji Sugawara,et al. Interactive Design Environment for Agent-Based System , 2005 .
[7] Stanislav Kurkovsky,et al. Mobile Voice Access in Social Networking Systems , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).
[8] Alec Wolman,et al. Lockr: social access control for web 2.0 , 2008, WOSN '08.
[9] Shigeru Fujita,et al. Agent-Based Design Model of Adaptive Distributed Systems , 1998, Applied Intelligence.
[10] Elisa Bertino,et al. TRBAC , 2001, ACM Trans. Inf. Syst. Secur..
[11] Shoichi Noguchi,et al. A Secure Distributed Database System with Time-series Data and Social-Relation Based Information Access Control , 2007 .