-
1
-
-
33847011964
-
-
J. Al-Muhtadi, A. Ranganathan, R. Campbell, M.D. Mickunas, Cerberus: A Context-aware security scheme for smart spaces, in: Proceedings of IEEE International Conference on Pervasive Computing and Communications, PerCom 2003, 2003, pp. 489-496
-
-
-
-
2
-
-
2642560332
-
-
H. Chen, T. Finin, A. Joshi, Semantic web in the context broker architecture, in: Proceedings of 2nd IEEE International Conference on Pervasive Computing and Communications, PerCom 2004, 2004, pp. 277-286
-
-
-
-
3
-
-
84948995473
-
-
M.J. Covington, P. Fogla, Z. Zhan, M. Ahamad, A Context-aware security architecture for emerging applications, in: Proceedings of 18th Annual Computer Security Applications Conference, ACSAC 2002, 2002
-
-
-
-
4
-
-
33746556779
-
-
F. Gandon, N. Sadeh, A semantic ewallet to reconcile privacy and context awareness, in: Proceedings of 2nd International Semantic Web Conference, ISWC2003, 2003
-
-
-
-
5
-
-
2442557513
-
Modeling privacy control in context-aware systems
-
Jiang X., and Landay J.A. Modeling privacy control in context-aware systems. IEEE Pervasive Computing 1 3 (2002) 59-63
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.3
, pp. 59-63
-
-
Jiang, X.1
Landay, J.A.2
-
6
-
-
33746567265
-
-
K. Minami, D. Kotz, Controlling access to pervasive information in the "Solar" system, Tech. Rep. TR2002-422, Dept. of Computer Science, Dartmouth College, February 2002
-
-
-
-
7
-
-
85084162149
-
-
L. Bauer, M.A. Schneider, E.W. Felten, A general and flexible access-control system for the web, in: Proceedings of 11th Usenix Security Symposium, 2002, pp. 93-108
-
-
-
-
8
-
-
85084100339
-
-
J. Howell, D. Kotz, End-to-end authorization, in: Proceedings of 4th Symposium on Operating System Design & Implementation, OSDI 2000, 2000, pp. 151-164
-
-
-
-
9
-
-
33646571158
-
-
U. Hengartner, P. Steenkiste, Exploiting information relationships for access control, in: Proceedings of 3rd IEEE International Conference on Pervasive Computing and Communications, PerCom 2005, 2005, pp. 269-278
-
-
-
-
10
-
-
27544508109
-
-
L. Bauer, S. Garriss, M.K. Reiter, Distributed proving in access-control systems, in: Proceedings of 2005 IEEE Symposium on Security and Privacy, 2005, pp. 81-95
-
-
-
-
11
-
-
33746555429
-
-
U. Hengartner, Access control to information in pervasive computing environments, Ph.D. Thesis, Computer Science Department, Carnegie Mellon University, available as Technical Report CMU-CS-05-160, August 2005
-
-
-
-
12
-
-
0348183205
-
Project aura: Towards distraction-free pervasive computing
-
Garlan D., Siewiorek D., Smailagic A., and Steenkiste P. Project aura: Towards distraction-free pervasive computing. IEEE Pervasive Computing 1 2 (2002) 22-31
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.2
, pp. 22-31
-
-
Garlan, D.1
Siewiorek, D.2
Smailagic, A.3
Steenkiste, P.4
-
13
-
-
85159704244
-
-
J. Howell, D. Kotz, A formal semantics for SPKI, in: Proceedings of 6th European Symposium on Research in Computer Security, ESORICS 2000, 2000, pp. 140-158
-
-
-
-
14
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson B., Abadi M., Burrows M., and Wobber E. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems 10 4 (1992) 263-310
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 263-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
15
-
-
33746481607
-
-
M. Dean, G. Schreiber, OWL Web Ontology Language Reference, W3C Recommendation, February 2004
-
-
-
-
16
-
-
13244268385
-
-
H. Chen, F. Perich, T. Finin, A. Joshi, SOUPA: Standard ontology for ubiquitous and pervasive applications, in: Proceedings of First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2004, 2004
-
-
-
-
17
-
-
33746579029
-
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen, SPKI certificate theory, RFC 2693, September 1999
-
-
-
-
18
-
-
62349090353
-
-
N. Li, J.C. Mitchell, RT: A role-based trust-managment framework, in: Proceedings of The Third DARPA Information Survivability Conference and Exposition, DISCEX III, 2003, pp. 201-212
-
-
-
-
19
-
-
33745470377
-
-
U. Hengartner, P. Steenkiste, Exploiting hierarchical identity-based encryption for access control to pervasive computing information, in: Proceedings of First IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks, IEEE/CreateNet SecureComm 2005, 2005, pp. 384-393
-
-
-
-
20
-
-
33847058446
-
-
G. Judd, P. Steenkiste, Providing contextual information to ubiquitous computing applications, in: Proceedings of IEEE International Conference on Pervasive Computing and Communications, PerCom 2003, 2003, pp. 133-142
-
-
-
-
21
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
Myles G., Friday A., and Davies N. Preserving privacy in environments with location-based applications. Pervasive Computing 2 1 (2003) 56-64
-
(2003)
Pervasive Computing
, vol.2
, Issue.1
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
22
-
-
33746491148
-
-
L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-Marshall, J. Reagle, The platform for privacy preferences 1.0 (P3P1.0) specification, W3C Recommendation, April 2002
-
-
-
-
23
-
-
84893084758
-
-
L. Kagal, T. Finin, A. Joshi, A policy language for a pervasive computing environment, in: Proceedings of 4th International Workshop on Policies for Distributed Systems and Networks, 2004, pp. 63-76
-
-
-
-
24
-
-
33746514417
-
-
S. Godik, T. Moses, eXtensible Access Control Markup Language (XACML) Version 1.0, OASIS Standard, February 2003
-
-
-
|