Security Research on the Interfaces of Information Appliances Described by XML
暂无分享,去创建一个
Hong Liu | Shaojun Qu | Hong Liu | Shaojun Qu
[1] Doo-Kwon Baik,et al. An Effective Policy Management Framework Using RBAC model for Service Platform based on Components , 2006, Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06).
[2] Anish Prasad Shrestha,et al. Kerberos based authentication for inter-domain roaming in wireless heterogeneous network , 2010, Comput. Math. Appl..
[3] Zhi-Hua Zhou,et al. Emerging Technologies in Knowledge Discovery and Data Mining, PAKDD 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers , 2007, PAKDD Workshops.
[4] Doo-Kwon Baik,et al. Bundle authentication and authorization using XML security in the OSGi service platform , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).
[5] QU Shao-jun. Research of Information Appliance and Remote Management System , 2010 .
[6] Liu Hong. Research of Family Network's Security , 2007 .
[7] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[8] Ulrik Pagh Schultz,et al. Distance-Based Access Modifiers Applied to Safety in Home Networks , 2004, EUSAI.
[9] Jung-Hyun Lee,et al. Flexible authorization in home network environments , 2010, Cluster Computing.
[10] Jong Wook Han,et al. Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks , 2006, EUC.
[11] Jong Hyuk Park,et al. Robust one-time password authentication scheme using smart card for home network environment , 2011, Comput. Commun..
[12] Sangwook Kim,et al. Security service framework for home network , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).
[13] Doo-Kwon Baik,et al. Access Control Policy Management Framework based on RBAC in OSGi Service Platform , 2006, The Sixth IEEE International Conference on Computer and Information Technology (CIT'06).
[14] Johannes Helander. Deeply embedded XML communication: towards an interoperable and seamless world , 2005, EMSOFT.
[15] Chun Chen,et al. A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..
[16] Jong Wook Han,et al. Security Framework for Home Network: Authentication, Authorization, and Security Policy , 2007, PAKDD Workshops.
[17] Ilsun You,et al. A One-Time Password Authentication Scheme for Secure Remote Access in Intelligent Home Networks , 2006, KES.
[18] Paddy Nixon,et al. Security models for trusting network appliances , 2002, Proceedings 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications.
[19] Zahir Tari,et al. On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II , 2007, OTM Conferences.
[20] Moon-Seog Jun,et al. A Study on Home Network User Authentication Using Token-Based OTP , 2010, SUComS.
[21] Adrian Stoica,et al. Security-Enriched Urban Computing and Smart Grid - First International Conference, SUComS 2010, Daejeon, Korea, September 15-17, 2010. Proceedings , 2010, International Conference on Security-Enriched Urban Computing and Smart Grid.
[22] Jong Wook Han,et al. Intelligent Home Network Authentication: Home Device Authentication Using Device Certification , 2007, OTM Conferences.