An Access Control Framework for Pervasive Computing Environments
暂无分享,去创建一个
[1] Vincent M. Stanford,et al. Pervasive Health Care Applications Face Tough Security Challenges , 2002, IEEE Pervasive Comput..
[2] Mustaque Ahamad,et al. A context-aware security architecture for emerging applications , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[3] Xie Jun,et al. Context-Aware Role-Based Access Control Model for Web Services , 2004 .
[4] Stephen Hailes,et al. An access control model based on distributed knowledge management , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[5] David Garlan,et al. Project Aura: Toward Distraction-Free Pervasive Computing , 2002, IEEE Pervasive Comput..
[6] Seng Wai Loke,et al. Methods for policy conflict detection and resolution in pervasive computing environments. , 2005, WWW 2005.
[7] Simon S. Lam,et al. Designing a distributed authorization service , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[8] Hong Fan,et al. A context-aware role-based access control model for Web services , 2005, IEEE International Conference on e-Business Engineering (ICEBE'05).
[9] Mahadev Satyanarayanan,et al. Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..
[10] William Yurcik,et al. Secure Smart Environments : Security Requirements , Challenges and Experiences in Pervasive Computing , 2005 .
[11] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[12] Patrick Brézillon,et al. Modeling context-based security policies with contextual graphs , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[13] Ravi S. Sandhu,et al. Models, protocols, and architectures for secure pervasive computing: challenges and research directions , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[14] Jianhua Ma,et al. A context based architecture for ubiquitous kid's safety care using space-oriented model , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[15] Chan Yeob Yeun,et al. Security for emerging ubiquitous networks , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[16] José M. Troya,et al. Applying the semantic Web layers to access control , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[17] Li Qin,et al. Concept-level access control for the Semantic Web , 2003, XMLSEC '03.
[18] Krysia Broda,et al. Policy Conflict Analysis Using Free Variable Tableaux for Access Control in Web Services Environments , 2005 .
[19] Peter Steenkiste,et al. Exploiting Information Relationships for Access Control , 2005, Third IEEE International Conference on Pervasive Computing and Communications.