Access Control Models for Pervasive Environments: A Survey
暂无分享,去创建一个
[1] Seog Park,et al. Context-Aware Role Based Access Control Using User Relationship , 2013 .
[2] JongWon Kim,et al. Design of Attribute-Based Access Control in Cloud Computing Environment , 2011, ICITCS.
[3] Jérôme Boudy,et al. Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance , 2014, Mob. Networks Appl..
[4] Ali Ahmed,et al. Trust-aware access control: How recent is your transaction history? , 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP).
[5] Bo Li,et al. Strategy of Domain and Cross-Domain Access Control Based on Trust in Cloud Computing Environment , 2014 .
[6] Zhao Wang,et al. Access Control Mechanism Based on Trust Quantification , 2010, 2010 IEEE Second International Conference on Social Computing.
[7] Belhadri Messabih,et al. User Behavior and Capability Based Access Control Model and Architecture , 2013 .
[8] Ning Zhang,et al. A Context-Risk-Aware Access Control model for Ubiquitous environments , 2008, 2008 International Multiconference on Computer Science and Information Technology.
[9] Fausto Giunchiglia,et al. Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment , 2010, Wirel. Pers. Commun..
[10] Patrice Clemente,et al. An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system , 2014, Future Gener. Comput. Syst..
[11] Ning Zhang,et al. An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.
[12] Bachar El-Hassan,et al. Towards a Context Aware Modeling of Trust and Access Control Based on the User Behavior and Capabilities , 2013, ICOST.
[13] Ramesh Kumar,et al. Context-Aware Architecture for User Access Control , 2014 .
[14] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[15] Liang Chen,et al. TRAAC: Trust and risk aware access control , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.
[16] Ali Ahmed. CONTEXT-AWARE ACCESS CONTROL IN UBIQUITOUS COMPUTING (CRAAC) , 2010 .
[17] Jeong-Oog Lee,et al. Context-Aware Access Control Mechanism for Ubiquitous Applications , 2005, AWIC.
[18] Heejo Lee,et al. Enforcing Access Control Using Risk Assessment , 2007, Fourth European Conference on Universal Multiservice Networks (ECUMN'07).