As smart phones users are increasingly expected to manage their own security policies, it's becoming more important to design usable security solutions. A socially aware access control policy model will help users better understand security implications and express their wishes.
暂无分享,去创建一个
Rebecca Montanari | Ora Lassila | Alessandra Toninelli | Deepali Khushraj | O. Lassila | R. Montanari | A. Toninelli | Deepali Khushraj
[1] Mahadev Satyanarayanan,et al. Guest Editors' Introduction: Security & Privacy , 2007, IEEE Pervasive Comput..
[2] Tristan Henderson,et al. Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.
[3] Lalana Kagal,et al. A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments , 2006, SEMWEB.
[4] Mark W. Newman,et al. Share and share alike: exploring the user interface affordances of file sharing , 2006, CHI.
[5] Ora Lassila,et al. Contextualizing applications via semantic middleware , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[6] Jeffrey M. Bradshaw,et al. Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder , 2003, SEMWEB.
[7] Nigel Davies,et al. Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..
[8] Diana K. Smetters,et al. Moving from the design of usable security technologies to the design of useful secure applications , 2002, NSPW '02.
[9] Mark Aakhus,et al. Perpetual Contact: Mobile Communication, Private Talk, Public Performance , 2002 .
[10] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.