Access Control at Triple Level: Specification and Enforcement of a Simple RDF Model to Support Concurrent Applications in Smart Environments
暂无分享,去创建一个
[1] Ronald Brown,et al. Cross-Domain Interoperability: A Case Study , 2009, NEW2AN.
[2] Ora Lassila,et al. Programming Semantic Web applications : a synthesis of knowledge representation and semi-structured data , 2007 .
[3] Jani Suomalainen,et al. Secure information sharing between heterogeneous embedded devices , 2010, ECSA '10.
[4] Edsger W. Dijkstra,et al. Cooperating sequential processes , 2002 .
[5] Ling Ma,et al. Acoustic environment as an indicator of social and physical context , 2005, Personal and Ubiquitous Computing.
[6] Ronald Brown,et al. Smart-M3 information sharing platform , 2010, The IEEE symposium on Computers and Communications.
[7] N. Ryan. Smart environments for cultural heritage , 2005 .
[8] Edsger W. Dijkstra,et al. Solution of a problem in concurrent programming control , 1965, CACM.
[9] Edsger W. Dijkstra,et al. Co-operating sequential processes , 1968 .
[10] Jesus Fernandez Gomez-Pimpollo,et al. Smart Objects for Intelligent Applications - ADK , 2010, 2010 IEEE Symposium on Visual Languages and Human-Centric Computing.
[11] J.M. Bradshaw,et al. Context-based security management for multi-agent systems , 2005, IEEE 2nd Symposium on Multi-Agent Security and Survivability, 2005..
[12] Sergey Balandin,et al. Smart Spaces and Next Generation Wired/Wireless Networking , 2009, Lecture Notes in Computer Science.
[13] Vesa Luukkala,et al. Experiences in implementing a cross-domain use case by combining semantic and service level platforms , 2010, The IEEE symposium on Computers and Communications.
[14] Amit Jain,et al. Secure resource description framework: an access control model , 2006, SACMAT '06.
[15] Timothy W. Finin,et al. Policy-Based Access Control for an RDF Store , 2005, IJCAI 2007.
[16] Jeffrey M. Bradshaw,et al. Rule-based and Ontology-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments , 2005 .
[17] Ravi S. Sandhu,et al. Lattice-based access control models , 1993, Computer.
[18] Eila Niemelä,et al. A Taxonomy of Information Security for Service-Centric Systems , 2007, 33rd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO 2007).