-
6
-
-
0003400255
-
Integrity considerations for secure computer systems
-
U.S. Air Force Electronic Systems Division
-
K. Biba, Integrity considerations for secure computer systems, Technical report 76-372, U.S. Air Force Electronic Systems Division, 1977
-
(1977)
Technical Report
, vol.76
, Issue.372
-
-
Biba, K.1
-
7
-
-
13244251119
-
Design and implementation of a large-scale context fusion network
-
August
-
G. Chen, M. Li, D. Kotz, Design and implementation of a large-scale context fusion network, in: First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous), August 2004, pp. 246-255
-
(2004)
First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous)
, pp. 246-255
-
-
Chen, G.1
Li, M.2
Kotz, D.3
-
8
-
-
1642293055
-
A security architecture for context-aware applications
-
Georgia Institute of Technology, May
-
M.J. Covington, M. Ahamad, S. Srinivasan, A security architecture for context-aware applications, Technical report GIT-CC-01-12, Georgia Institute of Technology, May 2001
-
(2001)
Technical Report
, vol.GIT-CC-01-12
-
-
Covington, M.J.1
Ahamad, M.2
Srinivasan, S.3
-
9
-
-
0035791053
-
Securing context-aware applications using environment roles
-
ACM Press
-
M.J. Covington, W. Long, S. Srinivasan, A.K. Dey, M. Ahamad, and G.D. Abowd Securing context-aware applications using environment roles Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies 2001 ACM Press 10 20
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
11
-
-
85092905398
-
Access control to information in pervasive computing environments
-
May
-
U. Hengartner, P. Steenkiste, Access control to information in pervasive computing environments, in: Proc. of 9th Workshop on Hot Topics in Operating Systems, HotOS IX, May 2003, pp. 157-162
-
(2003)
Proc. of 9th Workshop on Hot Topics in Operating Systems, HotOS IX
, pp. 157-162
-
-
Hengartner, U.1
Steenkiste, P.2
-
15
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
IEEE Computer Society
-
T. Jim SD3: A trust management system with certified evaluation Proceedings of the IEEE Symposium on Security and Privacy 2001 IEEE Computer Society 106 115
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
17
-
-
11144286525
-
Simple certificate validation protocol (SCVP)
-
draft-ietf-pkix-scvp-14.txt, April
-
A. Malpani, R. Housley, T. Freeman, Simple certificate validation protocol (SCVP), Internet Draft, draft-ietf-pkix-scvp-14.txt, April 2004. http://www.oasis-open.org/committees/download.php/2406/oasis-xamcl-1.0.pdf
-
(2004)
Internet Draft
-
-
Malpani, A.1
Housley, R.2
Freeman, T.3
-
18
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
G. Myles, A. Friday, and N. Davies Preserving privacy in environments with location-based applications IEEE Pervasive Computing 2 1 2003 56 64
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
19
-
-
0030086382
-
Role-based access control models
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman Role-based access control models IEEE Computer 29 2 1996 38 47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
|