Access control for local personal smart spaces
暂无分享,去创建一个
[1] Ying Zheng,et al. Study on the access control model , 2011, Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference.
[2] Jan H. P. Eloff,et al. Web services access control architecture incorporating trust , 2007, Internet Res..
[3] Alexander V. Smirnov,et al. Context-based access control model for smart space , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[4] Elizabeth Papadopoulou,et al. A Personal Smart Space approach to realising Ambient Ecologies , 2012, Pervasive Mob. Comput..
[5] Patrick Brézillon,et al. Context-based security policies: a new modeling approach , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[6] Erik Vullings,et al. A Trust-based Access Control Model for Virtual Organizations , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.
[7] Dan Wang,et al. ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[8] Neeli R. Prasad,et al. A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.
[9] Bernhard Walke,et al. IEEE 802.11 Wireless Local Area Networks , 2006 .
[10] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[11] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[12] Xiaojiang Du,et al. An effective access control scheme for preventing permission leak in Android , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).
[13] Mark Weiser. The computer for the 21st century , 1991 .
[14] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[15] Stefan Poslad,et al. Ubiquitous Computing: Smart Devices, Environments and Interactions , 2009 .
[16] Claudia Roncancio,et al. Context aware mobile transactions , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.
[17] Suhaimi Ibrahim,et al. A Security Conscious Service Discovery Framework in Pervasive Computing Environments , 2009, 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.
[18] J.A. Gutierrez,et al. IEEE 802.15.4: a developing standard for low-power low-cost wireless personal area networks , 2001, IEEE Network.