Activity-Oriented Access Control for Ubiquitous Environments
暂无分享,去创建一个
Heejo Lee | Sungyoung Lee | Le Xuan Hung | Weiwei Yuan | Miguel Fernandes | Riaz Ahmed Shaikh | Syed Muhammad Khaliq-ur-Rahman Raazi | Ngo Trong Canh | Hassan Jameel | Phan Tran Ho Truc | Yuseung Son | Sungyoung Lee | P. Truc | L. X. Hung | Heejo Lee | R. Shaikh | Weiwei Yuan | Hassan Jameel | S. K. Raazi | Miguel Fernandes | N. T. Canh | Yuseung Son
[1] Butler W. Lampson,et al. Dynamic protection structures , 1899, AFIPS '69 (Fall).
[2] Mustaque Ahamad,et al. Generalized Role-Based Access Control for Securing Future Applications , 2000 .
[3] Mark Weiser. The computer for the 21st century , 1991 .
[4] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[5] Jean Bacon,et al. A model of OASIS role-based access control and its support for active security , 2002, ACM Trans. Inf. Syst. Secur..
[6] David A. Bell,et al. Secure computer systems: mathematical foundations and model , 1973 .
[7] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[8] Jakob E. Bardram,et al. Activity-based computing: support for mobility and collaboration in ubiquitous computing , 2005, Personal and Ubiquitous Computing.
[9] Jakob E. Bardram. Activity-Based Computing – Lessons Learned and Open Issues , 2005 .
[10] Stephen Farrell,et al. Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.
[11] Antonio Corradi,et al. Context-based access control management in ubiquitous environments , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..