Social Semantic Network-Based Access Control
暂无分享,去创建一个
[1] Hannes Mühleisen,et al. SWRL-based Access Policies for Linked Data , 2010 .
[2] James A. Hendler,et al. Analyzing the AIR Language: A Semantic Web (Production) Rule Language , 2010, RR.
[3] Lalana Kagal,et al. A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments , 2006, SEMWEB.
[4] karen coyle,et al. Rights Management and Digital Library Requirements , 2004 .
[5] Nora Cuppens-Boulahia,et al. High Level Conflict Management Strategies in Advanced Access Control Models , 2007, ICS@SYNASC.
[6] Alexandre Passant,et al. A Privacy Preference Ontology (PPO) for Linked Data , 2011, LDOW.
[7] Carlo Curino,et al. A data-oriented survey of context models , 2007, SGMD.
[8] Serena Villata,et al. Ubiquitous access control for SPARQL endpoints: lessons learned and future challenges , 2012, WWW.
[9] John G. Breslin,et al. Social Semantic Web , 2009, Handbook of Semantic Web Technologies.
[10] Joe Presbrey,et al. Using RDF Metadata To Enable Access Control on the Social Semantic Web , 2009 .
[11] Catherine Faron-Zucker,et al. Querying the Semantic Web with Corese Search Engine , 2004, ECAI.
[12] Fausto Giunchiglia,et al. Ontology Driven Community Access Control , 2008, SPOT@ESWC.
[13] Bhavani M. Thuraisingham,et al. Semantic web-based social network access control , 2011, Comput. Secur..
[14] Antonio Corradi,et al. Context-based access control management in ubiquitous environments , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[15] Catherine Faron-Zucker,et al. SweetWiki: A semantic wiki , 2008, J. Web Semant..
[16] Antonio Corradi,et al. A Quality of Context-Aware Approach to Access Control in Pervasive Environments , 2009, MOBILWARE.
[17] Manoj R. Sastry,et al. A Contextual Attribute-Based Access Control Model , 2006, OTM Workshops.
[18] Bhavani M. Thuraisingham,et al. Reasoning with semantics-aware access control policies for geospatial web services , 2006, SWS '06.
[19] Sandra Payette,et al. Fedora: an architecture for complex objects and their relationships , 2005, International Journal on Digital Libraries.
[20] Gregory D. Abowd,et al. Securing context-aware applications using environment roles , 2001, SACMAT '01.
[21] Catherine Faron-Zucker,et al. Ontology-Based Access Rights Management , 2010, EGC.
[22] Lalana Kagal,et al. Proteus: A Semantic Context-Aware Adaptive Policy Model , 2007, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07).
[23] Henry Story,et al. FOAF + TLS : RESTful Authentication for Distributed Social Networks ? , 2009 .
[24] Jeremy J. Carroll,et al. Named graphs , 2005, J. Web Semant..
[25] Serena Villata,et al. An Access Control Model for Linked Data , 2011, OTM Workshops.
[26] Luca Costabello,et al. DC Proposal: PRISSMA, Towards Mobile Adaptive Presentation of the Web of Data , 2011, SEMWEB.
[27] Elisa Bertino,et al. Location-Aware Authentication and Access Control Concepts and Issues , 2009, 2009 International Conference on Advanced Information Networking and Applications.
[28] Catherine Faron-Zucker,et al. Searching the semantic Web: approximate query processing based on ontologies , 2006, IEEE Intelligent Systems.
[29] Serena Villata,et al. Social Semantic Web Access Control , 2011, SDoW@ISWC.
[30] Catherine Faron-Zucker,et al. The KGRAM Abstract Machine for Knowledge Graph Querying , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[31] Jani Mäntyjärvi,et al. An Ontology for Mobile Device Sensor-Based Context Awareness , 2003, CONTEXT.
[32] Anand R. Tripathi,et al. Context-aware role-based access control in pervasive computing systems , 2008, SACMAT '08.
[33] Nora Cuppens-Boulahia,et al. Modeling contextual security policies , 2008, International Journal of Information Security.
[34] Alfons H. Salden,et al. Context sensitive access control , 2005, SACMAT '05.
[35] Yu Cheng,et al. A Semantic Context-Based Model for Mobile Web Services Access Control , 2011 .
[36] Vassilios Peristeras,et al. Extracting and Utilizing Social Networks from Log Files of Shared Workspaces , 2009, PRO-VE.
[37] Grigoris Antoniou,et al. Controlling Access to RDF Graphs , 2010, FIS.
[38] Bhavani M. Thuraisingham,et al. ROWLBAC: representing role based access control in OWL , 2008, SACMAT '08.
[39] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[40] Alexandre Passant,et al. A Privacy Preference Manager for the Social Semantic Web , 2011, SPIM.
[41] Nicola Henze,et al. Enabling Advanced and Context-Dependent Access Control in RDF Stores , 2007, ISWC/ASWC.
[42] Anind K. Dey,et al. Understanding and Using Context , 2001, Personal and Ubiquitous Computing.