On the Modelling of Context-Aware Security for Mobile Devices
暂无分享,去创建一个
[1] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[2] Henry Prakken,et al. Logics for Defeasible Argumentation , 2001 .
[3] Ahmad-Reza Sadeghi,et al. ConXsense: automated context classification for context-aware access control , 2013, AsiaCCS.
[4] Zahir Tari,et al. CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living , 2014, Future Gener. Comput. Syst..
[5] Raian Ali,et al. Reasoning with contextual requirements: Detecting inconsistency and conflicts , 2013, Inf. Softw. Technol..
[6] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[7] Adam Wierzbicki,et al. On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML) , 2013, ICT-EurAsia.
[8] Mark Strembeck,et al. Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments , 2012, 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing.
[9] Grzegorz J. Nalepa,et al. Rule-based solution for context-aware reasoning on mobile devices , 2014, Comput. Sci. Inf. Syst..
[10] Bogdan Ksiezopolski,et al. Quality of Protection Evaluation of Security Mechanisms , 2014, TheScientificWorldJournal.
[11] Zbigniew Kotulski,et al. Adaptable security mechanism for dynamic environments , 2007, Comput. Secur..
[12] Timothy W. Finin,et al. CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies , 2012, Distributed and Parallel Databases.
[13] Muhammad Younas,et al. A new model for context-aware transactions in mobile services , 2011, Personal and Ubiquitous Computing.
[14] Alessio Merlo,et al. A survey on energy-aware security mechanisms , 2015, Pervasive Mob. Comput..
[15] Riza Cenk Erdur,et al. iConAwa - An intelligent context-aware system , 2012, Expert Syst. Appl..
[16] Tomasz Zurek. Model of Argument from Social Importance , 2014, JURIX.
[17] Dimitris Askounis,et al. A context awareness framework for cross-platform distributed applications , 2014, J. Syst. Softw..
[18] Ian Oakley,et al. CASA: context-aware scalable authentication , 2013, SOUPS.
[19] Henry Prakken,et al. The ASPIC+ framework for structured argumentation: a tutorial , 2014, Argument Comput..
[20] Zbigniew Kotulski,et al. On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems , 2011 .
[21] Adam Wierzbicki,et al. On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML) , 2012, Ann. UMCS Informatica.
[22] Henry Prakken,et al. A dialectical model of assessing conflicting arguments in legal reasoning , 1996, Artificial Intelligence and Law.
[23] Zbigniew Kotulski,et al. Adaptive Approach to Network Security , 2009, CN.
[24] Yaser Mowafi,et al. A Context-aware Adaptive Security Framework for Mobile Applications , 2014, ICCASA.
[25] Youakim Badr,et al. A security policy framework for context-aware and user preferences in e-services , 2009, J. Syst. Archit..
[26] Evaggelia Pitoura,et al. Managing contextual preferences , 2011, Inf. Syst..
[27] Charalabos Skianis,et al. A Survey on Context-Aware Mobile and Wireless Networking: On Networking and Computing Environments' Integration , 2013, IEEE Communications Surveys & Tutorials.