-
1
-
-
33847011964
-
Cerberus: A context-aware security scheme for smart spaces
-
AL-MUHTADI, J., RANGANATHAN, A., CAMPBELL, R., AND MICKUNAS, M. D. 2003. Cerberus: A context-aware security scheme for smart spaces. In Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom 2003). 489-496.
-
(2003)
Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom 2003)
, pp. 489-496
-
-
Al-Muhtadi, J.1
Ranganathan, A.2
Campbell, R.3
Mickunas, M.D.4
-
2
-
-
0033872896
-
RADAR: An in-building RF-based user location and tracking system
-
BAHL, P. AND PADMANABHAN, V. 2000. RADAR: An in-building RF-based user location and tracking system. In Proceedings of IEEE Infocom 2000. 775-784.
-
(2000)
Proceedings of IEEE Infocom 2000
, pp. 775-784
-
-
Bahl, P.1
Padmanabhan, V.2
-
4
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
BERTINO, E., BONATTI, P. A., AND FERRARI, E. 2001. TRBAC: A temporal role-based access control model. ACM Trans. Informat. Syst. Secur. 4, 3 (Aug.), 191-233.
-
(2001)
ACM Trans. Informat. Syst. Secur.
, vol.4
, Issue.3 AUG
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
6
-
-
4143081530
-
X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control
-
CERIAS, Purdue University
-
BHATTI, R. 2003. X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control. Tech. Rep. 2003-27, CERIAS, Purdue University.
-
(2003)
Tech. Rep.
, vol.2003
, Issue.27
-
-
Bhatti, R.1
-
7
-
-
0003226048
-
The KeyNote trust-management system version 2
-
BLAZE, M., IOANNIDIS, J., AND KEHOMYTIS, A. 1999. The KeyNote trust-management system version 2. RFC 2704.
-
(1999)
RFC
, vol.2704
-
-
Blaze, M.1
Ioannidis, J.2
Kehomytis, A.3
-
8
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonym
-
CHAUM, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonym. Communications of the ACM 24, 2 (Feb.), 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2 FEB
, pp. 84-88
-
-
Chaum, D.1
-
10
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
CLARKE, D., ELIEN, J.-E., FREDETTE, M., MORCOS, A., AND RIVEST, R. L. 2001. Certificate chain discovery in SPKI/SDSI. J. Comput. Secur. 9, 4, 285-322.
-
(2001)
J. Comput. Secur.
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Fredette, M.3
Morcos, A.4
Rivest, R.L.5
-
11
-
-
84948995473
-
A context-aware security architecture for emerging applications
-
COVINOTON, M. J., FOGLA, P., ZHAN, Z., AND AHAMAD, M. 2002. A context-aware security architecture for emerging applications. In Proceedings of 18th Annual Computer Security Applications Conference (ACSAC 2002).
-
(2002)
Proceedings of 18th Annual Computer Security Applications Conference (ACSAC 2002)
-
-
Covinoton, M.J.1
Fogla, P.2
Zhan, Z.3
Ahamad, M.4
-
12
-
-
0035791053
-
Securing context-aware applications using environment roles
-
COVINGTON, M. J., LONG, W., SRINIVASAN, S., DEY, A., AHAMAD, M., AND ABOWD, G. 2001. Securing context-aware applications using environment roles. In Proceedings of 6th ACM Symposium on Access Control Models and Technologies (SACMAT '01). 10-20.
-
(2001)
Proceedings of 6th ACM Symposium on Access Control Models and Technologies (SACMAT '01)
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, G.6
-
13
-
-
0013243382
-
-
W3C Recommendation
-
CRANOR, L., LANGHEINRICH, M., MARCHIORI, M., PRESLER-MARSHALL, M., AND REAGLE, J. 2002. The platform for privacy preferences 1.0 (P3P1.0) specification. W3C Recommendation.
-
(2002)
The Platform for Privacy Preferences 1.0 (P3P1.0) Specification
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Presler-Marshall, M.4
Reagle, J.5
-
14
-
-
2042461162
-
Instant messaging/presence protocol requirements
-
DAY, M., AGGARWAL, S., MOHR, G., AND VINCENT, J. 2000. Instant messaging/presence protocol requirements. RFC 2779.
-
(2000)
RFC
, vol.2779
-
-
Day, M.1
Aggarwal, S.2
Mohr, G.3
Vincent, J.4
-
15
-
-
1542593353
-
Authentication and authenticated key exchanges
-
DIFFIE, W., VAN OORSCHOT, P., AND WIENER, M. 1992. Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2, 107-125.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
16
-
-
0003358457
-
SPKI certificate theory
-
ELLISON, C., FRANTZ, B., LAMPSON, B., RIVEST, R., THOMAS, B., AND YLONEN, T. 1999. SPKI certificate theory. RFC 2693.
-
(1999)
RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
18
-
-
0348183205
-
Project Aura: Towards distraction-free pervasive computing
-
GARLAN, D., SIEWIOREK, D., SMAILAGIC, A., AND STEENKISTE, P. 2002. Project Aura: Towards distraction-free pervasive computing. IEEE Pervasive Computing 1, 2 (Apr.-June), 22-31.
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.2 APR.-JUNE
, pp. 22-31
-
-
Garlan, D.1
Siewiorek, D.2
Smailagic, A.3
Steenkiste, P.4
-
21
-
-
0028322851
-
A distributed location system for the active office
-
HARTER, A. AND HOPPER, A. 1994. A distributed location system for the active office. IEEE Network 8, 1 (Jan.), 62-70.
-
(1994)
IEEE Network
, vol.8
, Issue.1 JAN
, pp. 62-70
-
-
Harter, A.1
Hopper, A.2
-
26
-
-
84858906010
-
-
ICAL. ftp://ftp.scriptics.com/pub/tcVapps/ical/.
-
-
-
-
29
-
-
21644433636
-
Decentralized user authentication in a global file system
-
KAMINSKY, M., SAWIDES, G., MAZIÈRES, D., AND KAASHOEK, M. F. 2003. Decentralized user authentication in a global file system. In Proceedings of 19th ACM Symposium on Operating Systems Principles (SOSP'03). 60-73.
-
(2003)
Proceedings of 19th ACM Symposium on Operating Systems Principles (SOSP'03)
, pp. 60-73
-
-
Kaminsky, M.1
Sawides, G.2
Mazières, D.3
Kaashoek, M.F.4
-
30
-
-
0032026160
-
Security considerations for a distributed location service
-
LEONHARDT, U. AND MAGEE, J. 1998. Security considerations for a distributed location service. Journal Network Systems Management 6, 1 (Mar.), 51-70.
-
(1998)
Journal Network Systems Management
, vol.6
, Issue.1 MAR
, pp. 51-70
-
-
Leonhardt, U.1
Magee, J.2
-
32
-
-
0038825043
-
Beyond proof-of-compliance: Security analysis in trust management
-
Li, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. 2003a. Beyond proof-of-compliance: Security analysis in trust management. In Proceedings of 2003 IEEE Symposium on Security and Privacy, 123-139.
-
(2003)
Proceedings of 2003 IEEE Symposium on Security and Privacy
, pp. 123-139
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
33
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
LI, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. 2003b. Distributed credential chain discovery in trust management. J. Comput. Secur. 11, 1 (Feb.), 35-86.
-
(2003)
J. Comput. Secur.
, vol.11
, Issue.1 FEB
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
35
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
MYLES, G., FRIDAY, A., AND DAVIES, N. 2003. Preserving privacy in environments with location-based applications. Pervasive Computing 2, 1 (Jan.-Mar.), 56-64.
-
(2003)
Pervasive Computing
, vol.2
, Issue.1 JAN.-MAR.
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
37
-
-
84858899953
-
-
ORKUT. http://www.orkut.com.
-
-
-
-
39
-
-
78649710925
-
Trust for ubiquitous, transparent collaboration
-
SHAND, B., DIMMOCK, N., AND BACON, J. 2003. Trust for ubiquitous, transparent collaboration. In Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom 2003). 153-160.
-
(2003)
Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom 2003)
, pp. 153-160
-
-
Shand, B.1
Dimmock, N.2
Bacon, J.3
-
41
-
-
0027885613
-
Providing location information in a ubiquitous computing environment
-
SPREITZER, M. AND THEIMER, M. 1993. Providing location information in a ubiquitous computing environment. In Proceedings of SIGOPS '93. 270-283.
-
(1993)
Proceedings of SIGOPS '93
, pp. 270-283
-
-
Spreitzer, M.1
Theimer, M.2
-
44
-
-
0031248512
-
A new location technique for the active office
-
WARD, A., JONES, A., AND HOPPER, A. 1997. A new location technique for the active office. IEEE Personal Communications 4, 5 (Oct.), 42-47.
-
(1997)
IEEE Personal Communications
, vol.4
, Issue.5 OCT
, pp. 42-47
-
-
Ward, A.1
Jones, A.2
Hopper, A.3
-
45
-
-
78651232010
-
SSH transport layer protocol
-
YLONEN, T. 2003. SSH transport layer protocol. Internet Draft.
-
(2003)
Internet Draft
-
-
Ylonen, T.1
|