Integrated Access Control for Smart Buildings using Building Information Models
暂无分享,去创建一个
[1] Fernando Lyardet,et al. Context-Aware Indoor Navigation , 2008, AmI.
[2] Cecilia Mascolo,et al. Integrating security and usability into the requirements and design process , 2007, Int. J. Electron. Secur. Digit. Forensics.
[3] Vishal Singh,et al. BIM adoption : expectations across disciplines , 2010 .
[4] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[5] Dennis G. Kafura,et al. First experiences using XACML for access control in distributed systems , 2003, XMLSEC '03.
[6] Robert W. Reeder,et al. Improving user-interface dependability through mitigation of human error , 2005, Int. J. Hum. Comput. Stud..
[7] B. Beal. Vendor Analysis: IT security: the product vendor landscape , 2005 .
[8] Sabrina De Capitani di Vimercati,et al. A modular approach to composing access control policies , 2000, CCS.
[9] Charles M. Eastman,et al. Automatic rule-based checking of building designs , 2009 .
[10] Shamik Sural,et al. STARBAC: Spatio temporal Role Based Access C ontrol , 2007, OTM Conferences.
[11] Elisa Bertino,et al. GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.
[12] Ed Dawson,et al. Physical Access Control Administration Using Building Information Models , 2012, CSS.
[13] Arno Schlueter,et al. Building information model based energy/exergy performance assessment in early design stages , 2009 .
[14] Jean-Claude Thill,et al. Object-Oriented Data Modeling of an Indoor/Outdoor Urban Transportation Network and Route Planning Analysis , 2010 .
[15] Anthony M. Townsend,et al. Convergence of Physical and Logical Security: A Pre-implementation Checklist , 2008 .
[16] Elisa Bertino,et al. Spatial Domains for the Administration of Location-based Access Control Policies , 2008, Journal of Network and Systems Management.
[17] Andrew V. Goldberg,et al. Computing the shortest path: A search meets graph theory , 2005, SODA '05.
[18] Elisa Bertino,et al. A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.
[19] Erol Gelenbe,et al. Distributed Building Evacuation Simulator for Smart Emergency Management , 2010, Comput. J..
[20] H. S. Chandrashekar,et al. Packet sniffing: a brief introduction , 2003 .
[21] Robin Drogemuller,et al. Towards sustainable facilities management , 2009 .
[22] D. Richard Kuhn,et al. Adding Attributes to Role-Based Access Control , 2010, Computer.
[23] Marcia Kilchenman O'Malley,et al. Virtual Testing for Smart Buildings , 2012, 2012 Eighth International Conference on Intelligent Environments.
[24] Vijayalakshmi Atluri,et al. An authorization model for geospatial data , 2004, IEEE Transactions on Dependable and Secure Computing.
[25] Elisa Bertino,et al. Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[26] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[27] P. I-Hai Lin,et al. Internet-based monitoring and controls for HVAC applications , 2002 .
[28] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[29] Andrew S. Patrick,et al. HCI and security systems , 2003, CHI Extended Abstracts.
[30] Eduardo B. Fernández,et al. Security Patterns for Physical Access Control Systems , 2007, DBSec.
[31] Manachai Toahchoodee,et al. A Spatio-temporal Role-Based Access Control Model , 2007, DBSec.
[32] William D. Davis,et al. Building Tactical Information System for Public Safety Officials. Intelligent Building Response (iBR). | NIST , 2006 .
[33] Bilal Succar,et al. Building information modelling framework: A research and delivery foundation for industry stakeholders , 2009 .
[34] Robin Drogemuller,et al. Automated code checking and accessibility , 2006 .
[35] Manachai Toahchoodee,et al. A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications , 2008, TrustBus.
[36] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.
[37] Shamik Sural,et al. Role Based Access Control with Spatiotemporal Context for Mobile Applications , 2009, Trans. Comput. Sci..
[38] James A. Hendler,et al. Analyzing web access control policies , 2007, WWW '07.
[39] Thomas Becker,et al. Requirements and Space-Event Modeling for Indoor Navigation - How to simultaneously address route planning, multiple localization methods, navigation contexts, and different locomotion types , 2010 .
[40] Erol Gelenbe,et al. Intelligent Navigation Systems for Building Evacuation , 2011, ISCIS.
[41] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[42] Ricardo Jardim-Goncalves,et al. Challenging electronic procurement in the AEC sector: A BIM-based integrated perspective , 2011 .
[43] Andreas Matheus,et al. Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure , 2005, SACMAT '05.
[44] Mats Lind,et al. 2D vs 3D, implications on spatial memory , 2001, IEEE Symposium on Information Visualization, 2001. INFOVIS 2001..
[45] Brian T. Contos,et al. Physical and Logical Security Convergence: Powered By Enterprise Security Management: Powered By Enterprise Security Management , 2007 .
[46] Jan Kleissl,et al. Cyber-physical energy systems: Focus on smart buildings , 2010, Design Automation Conference.
[47] David W. Chadwick,et al. ‘ R-Whatq ’ Development of a role-based access control policy-writing tool for e-Scientists: Research Articles , 2005 .
[48] Michael F. Worboys,et al. Modeling indoor space , 2011, ISA '11.
[49] R. Ireland,et al. Inside the new organization: a blueprint for surviving restructuring, downsizing, acquisitions and outsourcing , 2005 .
[50] Angela Lee,et al. An IFC‐based space analysis for building accessibility layout for all users , 2004 .
[51] Konstantin Beznosov,et al. Towards understanding IT security professionals and their tools , 2007, SOUPS '07.
[52] Robin Drogemuller,et al. An Authorization Framework using Building Information Models , 2012, Comput. J..
[53] Elisa Bertino,et al. A discretionary access control model with temporal authorizations , 1994, Proceedings New Security Paradigms Workshop.
[54] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[55] Diana K. Smetters,et al. In search of usable security: five lessons from the field , 2004, IEEE Security & Privacy Magazine.
[56] Ki-Joune Li,et al. Indoor Space: A New Notion of Space , 2008, W2GIS.
[57] Edgar-Philipp Stoffel,et al. Applying hierarchical graphs to pedestrian indoor navigation , 2008, GIS '08.
[58] Sharath Pankanti,et al. An identity-authentication system using fingerprints , 1997, Proc. IEEE.
[59] Jan M. Herrmann. Administration of (Geo)XACML policies for spatial data infrastructures , 2011, SPRINGL '11.
[60] J. Reason. Human error: models and management , 2000, BMJ : British Medical Journal.
[61] Thomas H. Kolbe,et al. Conceptual Requirements for the Automatic Reconstruction of Building Information Models from Uninterpreted 3D Models , 2009 .
[62] Erol Gelenbe,et al. A distributed decision support system for Building Evacuation , 2009, 2009 2nd Conference on Human System Interactions.
[63] Simon N. Foley,et al. Anomaly analysis for Physical Access Control security configuration , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).
[64] Uwe Rueppel,et al. BIM-Based Indoor-Emergency-Navigation-System for Complex Buildings , 2008 .
[65] Elisa Bertino,et al. An access control model supporting periodicity constraints and temporal reasoning , 1998, TODS.
[66] Mike Rothery,et al. Critical Infrastructure Protection and the Role of Emergency Services , 2005 .
[67] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[68] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[69] Elisa Bertino,et al. A Temporal Access Control Mechanism for Database Systems , 1996, IEEE Trans. Knowl. Data Eng..
[70] Xiaoyang Sean Wang,et al. Authorization in trust management: Features and foundations , 2008, CSUR.
[71] Ravi S. Sandhu,et al. The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.
[72] Stuart Kent,et al. Model Driven Engineering , 2002, IFM.
[73] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[74] Emil C. Lupu,et al. Security and management policy specification , 2002, IEEE Netw..
[75] Robin Drogemuller,et al. Flexible airport terminal design : towards a framework , 2012 .
[76] Messaoud Benantar,et al. Access Control Systems: Security, Identity Management and Trust Models , 2005 .
[77] Nan Li,et al. Application Areas and Data Requirements for BIM-Enabled Facilities Management , 2012 .
[78] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[79] Maria Luisa Damiani,et al. Towards movement-aware access control , 2008, SPRINGL '08.
[80] Lujo Bauer,et al. Real life challenges in access-control management , 2009, CHI.
[81] Simson L. Garfinkel,et al. Design principles and patterns for computer systems that are simultaneously secure and usable , 2005 .
[82] Han Chen,et al. The Design and Implementation of a Smart Building Control System , 2009, 2009 IEEE International Conference on e-Business Engineering.
[83] David W. Chadwick,et al. Expressions of expertness: the virtuous circle of natural language for access control policy specification , 2008, SOUPS '08.
[84] Xiangyu Wang,et al. A theoretical framework of a BIM-based multi-disciplinary collaboration platform , 2011 .
[85] Hannu Penttilä,et al. Describing the changes in architectural information technology to understand design complexity and free-form architectural expression , 2006, J. Inf. Technol. Constr..
[86] Erol Gelenbe,et al. Simulating Autonomous Agents with augmented Reality , 2001, GAME-ON.
[87] Alejandro Metke-Jimenez,et al. Design of a model-generated repository as a service for USDL , 2010, iiWAS.
[88] Mustaque Ahamad,et al. Generalized Role-Based Access Control for Securing Future Applications , 2000 .
[89] Bin Chen,et al. Using SAML Callout to Realize Access Restriction for Geospatial Grid Services , 2008, 2008 Seventh International Conference on Grid and Cooperative Computing.