Controlled sharing of body-sensor data for sportsanalytics using code consent capabilities
暂无分享,去创建一个
[1] Robbert van Renesse,et al. Secure Abstraction with Code Capabilities , 2013, 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing.
[2] Andrew W. Leung,et al. Scalable security for petascale parallel file systems , 2007, Proceedings of the 2007 ACM/IEEE Conference on Supercomputing (SC '07).
[3] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[4] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[5] Wei Zhang,et al. Management of body-sensor data in sports analytic with operative consent , 2014, 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[6] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[7] Dick Hardt,et al. The OAuth 2.0 Authorization Framework , 2012, RFC.
[8] Angelos D. Keromytis,et al. Decentralized access control in distributed file systems , 2008, CSUR.
[9] T. Beauchamp,et al. Principles of biomedical ethics , 1991 .
[10] L. Roth,et al. What we do and do not know about informed consent. , 1981, JAMA.
[11] Peter J. Denning,et al. Computing as a discipline , 1989, Computer.
[12] John Linn,et al. The Kerberos Version 5 GSS-API Mechanism , 1996, RFC.
[13] Randal C. Burns,et al. Authenticating Network-Attached Storage , 2000, IEEE Micro.
[14] Elliot K. Kolodner,et al. Scalable Computing: Practice and Experience , 2011 .
[15] Henry M. Levy,et al. Capability-Based Computer Systems , 1984 .
[16] Norman Hardy,et al. The Confused Deputy: (or why capabilities might have been invented) , 1988, OPSR.
[17] Håvard D. Johansen,et al. Combining Video and Player Telemetry for Evidence-based Decisions in Soccer , 2018, icSPORTS.
[18] D. Estrin,et al. Open mHealth Architecture: An Engine for Health Care Innovation , 2010, Science.
[19] Erik Riedel,et al. The OSD security protocol , 2005, Third IEEE International Security in Storage Workshop (SISW'05).
[20] Robbert van Renesse,et al. Amoeba A Distributed Operating System for the 1990 s Sape , 1990 .
[21] Robbert van Renesse,et al. FirePatch: Secure and Time-Critical Dissemination of Software Patches , 2007, SEC.
[22] Deborah Estrin,et al. ohmage: An open mobile system for activity and experience sampling , 2012, 2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.
[23] J. Shapiro,et al. EROS: a fast capability system , 2000, OPSR.
[24] Robbert van Renesse,et al. Fireflies: scalable support for intrusion-tolerant network overlays , 2006, EuroSys.
[25] Dalit Naor,et al. Capability based Secure Access Control to Networked Storage Devices , 2007, 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007).
[26] Jack B. Dennis,et al. Programming semantics for multiprogrammed computations , 1966, CACM.
[27] Deborah Estrin,et al. Personal data vaults: a locus of control for personal data streams , 2010, CoNEXT.
[28] Mohammed Kaosar,et al. A Privacy-Preserving Framework for Personally Controlled Electronic Health Record (PCEHR) System , 2013 .
[29] Arnar Birgisson,et al. Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud , 2014, NDSS.
[30] Carsten Griwodz,et al. Bagadus: An integrated real-time system for soccer analytics , 2014, ACM Trans. Multim. Comput. Commun. Appl..