Access control and privacy in MANET emergency environment
暂无分享,去创建一个
Roslan Ismail | Azimah Abdul Ghapar | Asmidar Abu Bakar | A. Abu Bakar | Roslan Ismail | A. A. Ghapar
[1] Lili Sun,et al. A purpose based usage access control model , 2010 .
[2] Emil C. Lupu,et al. An opportunistic authority evaluation scheme for data security in crisis management scenarios , 2010, ASIACCS '10.
[3] Jamalul-lail Ab Manan,et al. Group based access control scheme: proof of method for secure access control architecture in mobile ad-hoc networks , 2009, MoMM.
[4] Joseph Migga Kizza. Access Control and Authorization , 2015 .
[5] Ning Zhang,et al. A Purpose-Based Access Control Model , 2007 .
[6] Zhibin Wang,et al. Trust Representation and Reasoning for Access Control in Large Scale Distributed Systems , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.
[7] Joan Feigenbaum,et al. Privacy, integrity, and incentive-compatibility in computations with untrusted parties , 2004 .
[8] Ninghui Li,et al. Purpose based access control for privacy protection in relational database systems , 2008, The VLDB Journal.
[9] Tommy Back. P 2 P Information Sharing in Mobile Ad-hoc Networks , 2005 .
[10] Celeste Campo,et al. PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .
[11] Naikuo Yang. Formalism of privacy preserving access control , 2011 .
[12] Thomas Plagemann,et al. A Data Sharing Facility for Mobile Ad-Hoc Emergency and Rescue Applications , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).
[13] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[14] Danfeng Yao. An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing , 2008, Security and Management.
[15] Dina Satybaldina,et al. Short Paper: A Framework for the Privacy Access Control Model , 2013, Business Process Management Workshops.
[16] Elisa Bertino,et al. Privacy Protection , 2022 .
[17] Qi Shi,et al. Journal of Information Assurance and Security , 2009 .
[18] Patrick C. K. Hung,et al. Towards a Privacy Access Control Model for e-Healthcare Services , 2005, PST.
[19] Ning Zhang,et al. A Purpose-Based Access Control Model , 2007, Third International Symposium on Information Assurance and Security.
[20] N.J. Davis,et al. Toward a decentralized trust-based access control system for dynamic collaboration , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[21] Heejo Lee,et al. A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[22] S. Swamynathan,et al. Purpose Based Access Control for Privacy Protection in Object Relational Database Systems , 2010, 2010 International Conference on Data Storage and Data Engineering.
[23] Vladimir A. Oleshchuk,et al. Spatial role-based access control model for wireless networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[24] Kazi M. Ahmed,et al. Emergency Response Communications and Associated Security Challenges , 2010, ArXiv.
[25] Lalana Kagal,et al. Access Control is an Inadequate Framework for Privacy Protection , 2010 .
[26] M. Fragkakis,et al. Comparing the Trust and Security Models of Mobile Agents , 2007 .
[27] Jamalul-lail Ab Manan,et al. Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad- hoc environment , 2009, 2009 Fourth International Conference on Digital Information Management.
[28] J. Rubenfeld. The Right of Privacy , 1989 .