-
2
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Sep.
-
Clifford Neuman, B. and Ts'o, T., "Kerberos: An Authentication Service for Computer Networks", IEEE Communications Magazine, Vol. 32, No. 9, pp. 33-38, Sep. 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Clifford, N.B.1
Ts'o, T.2
-
3
-
-
1642330512
-
-
IEEE Computer Society Press
-
Kohl, J.T., Clifford Neuman, B. and T'so, T., "The Evolution of the Kerberos Authentication System", IEEE Computer Society Press, 78-94, 1994.
-
(1994)
The Evolution of the Kerberos Authentication System
, pp. 78-94
-
-
Kohl, J.T.1
Clifford Neuman, B.2
T'so, T.3
-
4
-
-
1642416486
-
-
"MIT's Kerberos Homepage", http://web.mit.edu/kerberos/www/
-
-
-
-
5
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson, B., Abadi, M., Burrows, M. and Wobber, E., "Authentication in distributed systems: Theory and practice", ACM Transactions on Computer Systems, 10(4):265-310, 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
6
-
-
1642338624
-
Jini(TM) architecture specification, version 1.2
-
Sun Microsystems Inc., "Jini(TM) Architecture Specification", Version 1.2. http://wwws.sun.com/software/jini/specs/index.html
-
-
-
-
7
-
-
1642374485
-
-
Internal Working Paper No 02-07, Department of Informatics, University of Fribourg, May
-
Kouadri Mostéfaoui G., Pasquier-Rocha, J. and Gachet, A., "Security Models for the Jini Networking Technology: A Case Study", Internal Working Paper No 02-07, Department of Informatics, University of Fribourg, May 2002.
-
(2002)
Security Models for the Jini Networking Technology: A Case Study
-
-
Kouadri, M.G.1
Pasquier-Rocha, J.2
Gachet, A.3
-
8
-
-
0038400220
-
A survey of public-key infrastructures
-
Master Thesis, Department of Computer Science, McGill University, Montreal
-
Branchaud M., "A Survey of Public-Key Infrastructures", Master Thesis, Department of Computer Science, McGill University, Montreal 1997.
-
(1997)
-
-
Branchaud, M.1
-
10
-
-
84994391858
-
Role-based access control on the web
-
February
-
Park, J., Sandhu, R. and Ahn, G., "Role-Based Access Control on the Web", ACM Transactions on Information and System Security (TISSEC), Vol. 4, No. 1, pages 37-71, February 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.1
, pp. 37-71
-
-
Park, J.1
Sandhu, R.2
Ahn, G.3
-
11
-
-
84863254921
-
Dynamic trust models for ubiquitous computing environments
-
English, C., Nixon, P. Terzis, S., McGettrick, A. and Lowe, H., "Dynamic Trust Models for Ubiquitous Computing Environments", Proceedings of UBICOMP2002 - Workshop on Security in Ubiquitous Computing, Göteborg, Sweden, September 2002.
-
Proceedings of UBICOMP2002 - Workshop on Security in Ubiquitous Computing, Göteborg, Sweden, September 2002
-
-
English, C.1
Nixon, P.2
Terzis, S.3
McGettrick, A.4
Lowe, H.5
-
12
-
-
7644231825
-
A security architecture based on trust management for pervasive computing systems
-
Kagal, L., Undercoffer, J., Perich, F., Joshi, A. and Finin, T., "A Security Architecture Based on Trust Management for Pervasive Computing Systems", Proceedings of Grace Hopper Celebration of Women in Computing 2002.
-
Proceedings of Grace Hopper Celebration of Women in Computing 2002
-
-
Kagal, L.1
Undercoffer, J.2
Perich, F.3
Joshi, A.4
Finin, T.5
-
13
-
-
84900830868
-
Understanding and using context
-
Dey, A. K., "Understanding and using context", Personal and Ubiquitous Computing, Vol 5, No. 1, 4-7, 2001.
-
(2001)
Personal and Ubiquitous Computing
, vol.5
, Issue.1
, pp. 4-7
-
-
Dey, A.K.1
-
15
-
-
0001903466
-
Context-aware computing applications
-
B. Schilit, N. Adams and R. Want, "Context-Aware Computing Applications", IEEE Workshop on Mobile Computing Systems and Applications, 8-9, December 1994.
-
IEEE Workshop on Mobile Computing Systems and Applications, 8-9,December 1994
-
-
Schilit, B.1
Adams, N.2
Want, R.3
-
16
-
-
0003429331
-
A survey of context-aware mobile computing research
-
Department of Computer Science Dartmouth College
-
Chen G., Kotz D., "A Survey of Context-Aware Mobile Computing Research", Department of Computer Science Dartmouth College, Technical Report TR2000-381.
-
Technical Report TR2000-381
-
-
Chen, G.1
Kotz, D.2
-
17
-
-
1642293055
-
A security architecture for context-aware applications
-
College of Computing, Georgia Institute of Technology
-
Covington, M.J., Ahamad, M., Srinivasan, S., "A Security Architecture for Context-Aware Applications", Technical Report GIT-CC-01-12, College of Computing, Georgia Institute of Technology, 2001.
-
(2001)
Technical Report GIT-CC-01-12
-
-
Covington, M.J.1
Ahamad, M.2
Srinivasan, S.3
-
18
-
-
0035791053
-
Securing context-aware applications using environment roles
-
Covington, M.J., Wende, L., Srinivasan, S., Dey, D., Ahamad, M., and Abowd, G., "Securing Context-Aware Applications Using Environment Roles" Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT '01), Chantilly, Virginia, USA, 10-20, May 2001.
-
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT '01), Chantilly, Virginia, USA, 10-20, May 2001
-
-
Covington, M.J.1
Wende, L.2
Srinivasan, S.3
Dey, D.4
Ahamad, M.5
Abowd, G.6
-
19
-
-
84948995473
-
A context-aware security architecture for emerging applications
-
Covington, M.J., Fogla, P., Zhan, Z. and Ahamad, M., "A Context-aware Security Architecture for Emerging Applications", Proceedings of the Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada, USA, December 2002.
-
Proceedings of the Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada, USA, December 2002
-
-
Covington, M.J.1
Fogla, P.2
Zhan, Z.3
Ahamad, M.4
-
20
-
-
10444257414
-
Enabling secure ad-hoc communication using context-aware security services
-
Shankar, N., Balfanz D., "Enabling Secure Ad-hoc Communication using Context-Aware Security Services", Proceedings of UBICOMP2002 - Workshop on Security in Ubiquitous Computing, Göteborg, Sweden, September 2002.
-
Proceedings of UBICOMP2002 - Workshop on Security in Ubiquitous Computing, Göteborg, Sweden, September 2002
-
-
Shankar, N.1
Balfanz, D.2
-
21
-
-
1642366293
-
Context aware and yet another service AYA
-
Kato, H., "Context Aware and Yet Another Service AYA", Proceedings of UBICOMP2002 - Workshop on Security in Ubiquitous Computing, Göteborg, Sweden, September 2002.
-
Proceedings of UBICOMP2002 - Workshop on Security in Ubiquitous Computing, Göteborg, Sweden, September 2002
-
-
Kato, H.1
-
22
-
-
84958964894
-
Modeling context information in pervasive computing systems
-
Springer-Verlag
-
Henricksen, K., Indulska, J., Rakotonirainy, A., "Modeling Context Information in Pervasive computing Systems", Proceedings of the First International Conference - Pervasive 02 - Zurich, Lecture Notes in Computer Science, Vol. 2414. 167-180, Springer-Verlag 2002.
-
(2002)
Proceedings of the First International Conference - Pervasive 02 - Zurich, Lecture Notes in Computer Science
, vol.2414
, pp. 167-180
-
-
Henricksen, K.1
Indulska, J.2
Rakotonirainy, A.3
-
23
-
-
1642267159
-
Rule-based representation
-
(edited by R.H. Allen), ASCE
-
Bose, A. and Allen, R.H., "Rule-Based Representation", In Expert Systems for Civil Engineers: Knowledge Representation (edited by R.H. Allen), ASCE, 33-45, 1992.
-
(1992)
Expert Systems for Civil Engineers: Knowledge Representation
, pp. 33-45
-
-
Bose, A.1
Allen, R.H.2
-
24
-
-
2442767774
-
Context in problem solving: A survey
-
Brézillon, P., "Context in Problem solving: A Survey", The Knowledge Engineering Review, 14(1), 1-34, 1999.
-
(1999)
The Knowledge Engineering Review
, vol.14
, Issue.1
, pp. 1-34
-
-
Brézillon, P.1
|