QACBAC: an owner-centric QoC-aware context-based access control model for pervasive environments
暂无分享,去创建一个
[1] Paddy Nixon,et al. Categorisation and modelling of quality in context information , 2005, IJCAI 2005.
[2] Anind K. Dey,et al. Understanding and Using Context , 2001, Personal and Ubiquitous Computing.
[3] Jérôme Gensel,et al. A Semantic Approach and a Web Tool for Contextual Annotation of Photos Using Camera Phones , 2007, WISE.
[4] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[5] Bill N. Schilit,et al. Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.
[6] Tai-Myung Chung,et al. Context-Role Based Access Control for Context-Aware Application , 2006, HPCC.
[7] Claudia Linnhoff-Popien,et al. A Context Modeling Survey , 2004 .
[8] Yolande Berbers,et al. Quality Extensions and Uncertainty Handling for Context Ontologies , 2006, C&O@ECAI.
[9] Thomas Springer,et al. Context-Dependent Access Control for Contextual Information , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[10] Rossana M. de Castro Andrade,et al. FRAMESEC: a framework for the application development with end-to-end security provision in the mobile computing environment , 2005, Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop (AICT/SAPIR/ELETE'05).
[11] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[12] Manachai Toahchoodee,et al. A Spatio-temporal Role-Based Access Control Model , 2007, DBSec.
[13] Guanling Chen,et al. A Survey of Context-Aware Mobile Computing Research , 2000 .
[14] Shigetoshi YOKOYAMA,et al. An Anonymous Context Aware Access Control Architecture For Ubiquitous Services , 2006, 7th International Conference on Mobile Data Management (MDM'06).
[15] Elisa Bertino,et al. TRBAC , 2001, ACM Trans. Inf. Syst. Secur..
[16] Axel Küpper,et al. Quality of Context: What It Is And Why We Need It , 2004 .
[17] Zhaohui Wu,et al. A Context Quality Model for Ubiquitous Applications , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[18] Younghee Kim,et al. A Quality Measurement Method of Context Information in Ubiquitous Environments , 2006, 2006 International Conference on Hybrid Information Technology.
[19] James B. D. Joshi,et al. LoT-RBAC: A Location and Time-Based RBAC Model , 2005, WISE.
[20] Marten van Sinderen,et al. Middleware Support for Quality of Context in Pervasive Context-Aware Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[21] Jérôme Gensel,et al. PhotoMap - Automatic Spatiotemporal Annotation for Mobile Photos , 2007, W2GIS.
[22] Mustaque Ahamad,et al. Generalized role-based access control , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[23] Andrés Marín López,et al. TrustAC: Trust-Based Access Control for Pervasive Devices , 2005, SPC.
[24] Jeong-Oog Lee,et al. Context-Aware Access Control Mechanism for Ubiquitous Applications , 2005, AWIC.