PO-SAAC: A Purpose-Oriented Situation-Aware Access Control Framework for Software Services
暂无分享,去创建一个
Jun Han | Alan W. Colman | A. S. M. Kayes | Jun Han | A. Colman | A. Kayes
[1] Russell Gurbutt,et al. Health professionals , 2006, Children and Young People Now.
[2] Hua Wang,et al. Purpose Based Access Control for Privacy Protection in E-Healthcare Services , 2012, J. Softw..
[3] Anind K. Dey,et al. Understanding and Using Context , 2001, Personal and Ubiquitous Computing.
[4] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[5] Claudio Bettini,et al. OWL 2 modeling and reasoning with complex human activities , 2011, Pervasive Mob. Comput..
[6] Jun Han,et al. An Ontology-Based Approach to Context-Aware Access Control for Software Services , 2013, WISE.
[7] Stephen S. Yau,et al. Development of Situation-Aware Applications in Services and Cloud Computing Environments , 2013, Int. J. Softw. Informatics.
[8] Guangyan Huang,et al. Web Information Systems Engineering – WISE 2013 , 2013, Lecture Notes in Computer Science.
[9] Linda Dimitropoulos. Privacy and security solutions for interoperable health information exchange: Nationwide summary , 2007 .
[10] Sandeep K. S. Gupta,et al. Reconfigurable Context-Sensitive Middleware for Pervasive Computing , 2002, IEEE Pervasive Comput..
[11] Mieczyslaw M. Kokar,et al. Situation Awareness and Cognitive Modeling , 2012, IEEE Intelligent Systems.
[12] Jongin Lim,et al. Dynamic Activation of Role on RBAC for Ubiquitous Applications , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[13] Nicola Glover-Thomas,et al. Mental Health Professionals , 2010 .
[14] Stephen S. Yau,et al. A Situation-aware Access Control based Privacy-Preserving Service Matchmaking Approach for Service-Oriented Architecture , 2007, IEEE International Conference on Web Services (ICWS 2007).
[15] Jadwiga Indulska,et al. A survey of context modelling and reasoning techniques , 2010, Pervasive Mob. Comput..
[16] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[17] Tao Gu,et al. Ontology based context modeling and reasoning using OWL , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[18] Mica R. Endsley,et al. Design and Evaluation for Situation Awareness Enhancement , 1988 .
[19] Ninghui Li,et al. Purpose based access control for privacy protection in relational database systems , 2008, The VLDB Journal.