메뉴 건너뛰기




Volumn 2, Issue 3, 2006, Pages 344-367

Exploiting information relationships for access control in pervasive computing

Author keywords

Distributed access control; Information relationships; Semantics

Indexed keywords

COMPUTER ARCHITECTURE; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION DISSEMINATION; SECURITY OF DATA; SEMANTICS; SOFTWARE PROTOTYPING;

EID: 33746560721     PISSN: 15741192     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.pmcj.2006.05.001     Document Type: Article
Times cited : (2)

References (24)
  • 1
    • 33847011964 scopus 로고    scopus 로고
    • J. Al-Muhtadi, A. Ranganathan, R. Campbell, M.D. Mickunas, Cerberus: A Context-aware security scheme for smart spaces, in: Proceedings of IEEE International Conference on Pervasive Computing and Communications, PerCom 2003, 2003, pp. 489-496
  • 2
    • 2642560332 scopus 로고    scopus 로고
    • H. Chen, T. Finin, A. Joshi, Semantic web in the context broker architecture, in: Proceedings of 2nd IEEE International Conference on Pervasive Computing and Communications, PerCom 2004, 2004, pp. 277-286
  • 3
    • 84948995473 scopus 로고    scopus 로고
    • M.J. Covington, P. Fogla, Z. Zhan, M. Ahamad, A Context-aware security architecture for emerging applications, in: Proceedings of 18th Annual Computer Security Applications Conference, ACSAC 2002, 2002
  • 4
    • 33746556779 scopus 로고    scopus 로고
    • F. Gandon, N. Sadeh, A semantic ewallet to reconcile privacy and context awareness, in: Proceedings of 2nd International Semantic Web Conference, ISWC2003, 2003
  • 5
    • 2442557513 scopus 로고    scopus 로고
    • Modeling privacy control in context-aware systems
    • Jiang X., and Landay J.A. Modeling privacy control in context-aware systems. IEEE Pervasive Computing 1 3 (2002) 59-63
    • (2002) IEEE Pervasive Computing , vol.1 , Issue.3 , pp. 59-63
    • Jiang, X.1    Landay, J.A.2
  • 6
    • 33746567265 scopus 로고    scopus 로고
    • K. Minami, D. Kotz, Controlling access to pervasive information in the "Solar" system, Tech. Rep. TR2002-422, Dept. of Computer Science, Dartmouth College, February 2002
  • 7
    • 85084162149 scopus 로고    scopus 로고
    • L. Bauer, M.A. Schneider, E.W. Felten, A general and flexible access-control system for the web, in: Proceedings of 11th Usenix Security Symposium, 2002, pp. 93-108
  • 8
    • 85084100339 scopus 로고    scopus 로고
    • J. Howell, D. Kotz, End-to-end authorization, in: Proceedings of 4th Symposium on Operating System Design & Implementation, OSDI 2000, 2000, pp. 151-164
  • 9
    • 33646571158 scopus 로고    scopus 로고
    • U. Hengartner, P. Steenkiste, Exploiting information relationships for access control, in: Proceedings of 3rd IEEE International Conference on Pervasive Computing and Communications, PerCom 2005, 2005, pp. 269-278
  • 10
    • 27544508109 scopus 로고    scopus 로고
    • L. Bauer, S. Garriss, M.K. Reiter, Distributed proving in access-control systems, in: Proceedings of 2005 IEEE Symposium on Security and Privacy, 2005, pp. 81-95
  • 11
    • 33746555429 scopus 로고    scopus 로고
    • U. Hengartner, Access control to information in pervasive computing environments, Ph.D. Thesis, Computer Science Department, Carnegie Mellon University, available as Technical Report CMU-CS-05-160, August 2005
  • 13
    • 85159704244 scopus 로고    scopus 로고
    • J. Howell, D. Kotz, A formal semantics for SPKI, in: Proceedings of 6th European Symposium on Research in Computer Security, ESORICS 2000, 2000, pp. 140-158
  • 15
    • 33746481607 scopus 로고    scopus 로고
    • M. Dean, G. Schreiber, OWL Web Ontology Language Reference, W3C Recommendation, February 2004
  • 16
    • 13244268385 scopus 로고    scopus 로고
    • H. Chen, F. Perich, T. Finin, A. Joshi, SOUPA: Standard ontology for ubiquitous and pervasive applications, in: Proceedings of First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2004, 2004
  • 17
    • 33746579029 scopus 로고    scopus 로고
    • C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen, SPKI certificate theory, RFC 2693, September 1999
  • 18
    • 62349090353 scopus 로고    scopus 로고
    • N. Li, J.C. Mitchell, RT: A role-based trust-managment framework, in: Proceedings of The Third DARPA Information Survivability Conference and Exposition, DISCEX III, 2003, pp. 201-212
  • 19
    • 33745470377 scopus 로고    scopus 로고
    • U. Hengartner, P. Steenkiste, Exploiting hierarchical identity-based encryption for access control to pervasive computing information, in: Proceedings of First IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks, IEEE/CreateNet SecureComm 2005, 2005, pp. 384-393
  • 20
    • 33847058446 scopus 로고    scopus 로고
    • G. Judd, P. Steenkiste, Providing contextual information to ubiquitous computing applications, in: Proceedings of IEEE International Conference on Pervasive Computing and Communications, PerCom 2003, 2003, pp. 133-142
  • 21
    • 2342502819 scopus 로고    scopus 로고
    • Preserving privacy in environments with location-based applications
    • Myles G., Friday A., and Davies N. Preserving privacy in environments with location-based applications. Pervasive Computing 2 1 (2003) 56-64
    • (2003) Pervasive Computing , vol.2 , Issue.1 , pp. 56-64
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 22
    • 33746491148 scopus 로고    scopus 로고
    • L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-Marshall, J. Reagle, The platform for privacy preferences 1.0 (P3P1.0) specification, W3C Recommendation, April 2002
  • 23
    • 84893084758 scopus 로고    scopus 로고
    • L. Kagal, T. Finin, A. Joshi, A policy language for a pervasive computing environment, in: Proceedings of 4th International Workshop on Policies for Distributed Systems and Networks, 2004, pp. 63-76
  • 24
    • 33746514417 scopus 로고    scopus 로고
    • S. Godik, T. Moses, eXtensible Access Control Markup Language (XACML) Version 1.0, OASIS Standard, February 2003


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.