Context-Aware Identity Management in Pervasive Ad-hoc Environments
暂无分享,去创建一个
[1] Karsten Schwan,et al. Opportunistic Overlays: Efficient Content Delivery in Mobile Ad Hoc Networks , 2005, Middleware.
[2] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[3] Marek Hatala,et al. Enabling User Control with Personal Identity Management , 2007, IEEE International Conference on Services Computing (SCC 2007).
[4] Tzung-Shi Chen,et al. A framework of mobile context management for supporting context-aware environments in mobile ad hoc networks , 2007, IWCMC.
[5] Adrian David Cheok,et al. A User Acceptance Study on a Plant Mixed Reality System for Primary School Children , 2008 .
[6] Jörn Altmann,et al. UNIQuE: A User-Centric Framework for Network Identity Management , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[7] Naranker Dulay,et al. Authorisation and Conflict Resolution for Hierarchical Domains , 2007, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07).
[8] Haiyong Luo,et al. The WiMap: A Dynamic Indoor WLAN Localization System , 2011, Int. J. Adv. Pervasive Ubiquitous Comput..
[9] Mark Strembeck,et al. An approach to engineer and enforce context constraints in an RBAC environment , 2003, SACMAT '03.
[10] Judith A. Symonds,et al. An Evaluation of the RFID Security Benefits of the APF System: Hospital Patient Data Protection , 2009, Int. J. Adv. Pervasive Ubiquitous Comput..
[11] Abhilasha Bhargav-Spantzel,et al. User centricity: a taxonomy and open issues , 2006, DIM '06.
[12] Claudia Linnhoff-Popien,et al. A Context Modeling Survey , 2004 .
[13] Mehdi Khosrow-Pour,et al. Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Applications , 2009 .
[14] Gareth J. F. Jones,et al. Context-aware Retrieval: Exploring a New Environment for Information Retrieval and Information Filtering , 2001, Personal and Ubiquitous Computing.
[15] Marten van Sinderen,et al. An Information Model and Architecture for Context-Aware Management Domains , 2008, 2008 IEEE Workshop on Policies for Distributed Systems and Networks.
[16] Dongwan Shin,et al. Towards Privacy in Enterprise Directory Services: A User-Centric Approach to Attribute Management , 2007, 2007 41st Annual IEEE International Carnahan Conference on Security Technology.
[17] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[18] Nicola Blefari-Melazzi,et al. Reconfigurable Systems with a User-Centric Focus , 2007, 2007 International Symposium on Applications and the Internet Workshops.
[19] Petri Savolainen,et al. Ubiquitous Communication: where is the Value Created in the Multi-Play Value Network? , 2009 .
[20] Wang Mei,et al. Research and Implementation of Self-Publishing Website Platforms for Universities Based on CMS , 2011, Int. J. Adv. Pervasive Ubiquitous Comput..
[21] K. Cameron,et al. The Laws of Identity , 2005 .
[22] Ann Blandford,et al. Situation awareness in emergency medical dispatch , 2004, Int. J. Hum. Comput. Stud..
[23] Francisco Milton Mendes Neto,et al. Designing Solutions-Based Ubiquitous and Pervasive Computing: New Issues and Trends , 2010 .
[24] Ravi S. Sandhu,et al. The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.
[25] Emil C. Lupu,et al. Tools for domain-based policy management of distributed systems , 2002, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327).
[26] Atul Prakash,et al. Methods and limitations of security policy reconciliation , 2006, TSEC.
[27] Marit Hansen,et al. User-Centric Identity Management: New Trends in Standardization and Regulation , 2007, IEEE Security & Privacy.
[28] Qi Shi,et al. Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets) , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.
[29] Q. Shi,et al. A Framework for User-Centred and Context-Aware Identity Management in Mobile Ad Hoc Networks (UCIM) , 2009 .
[30] Qi Shi,et al. Situation Awareness in Systems of Systems Ad-Hoc Environments , 2009 .
[31] Mark Weiser,et al. The computer for the 21st Century , 1991, IEEE Pervasive Computing.