-
1
-
-
33847011964
-
Cerberus: A context-aware security scheme for smart spaces
-
J. Al-Muhtadi, A. Ranganathan, R. Campbell and M. D. Mickunas, Cerberus: a context-aware security scheme for smart spaces, IEEE Int'l Conf. on Pervasive Computing and Communications (PerCom), 489-496, 2003.
-
(2003)
IEEE Int'l Conf. on Pervasive Computing and Communications (PerCom)
, pp. 489-496
-
-
Al-Muhtadi, J.1
Ranganathan, A.2
Campbell, R.3
Mickunas, M.D.4
-
2
-
-
30644474741
-
GEO-RBAC: A spatially aware RBAC
-
June
-
E. Bertino, B. Catania, M. L. Damiani and P. Perlasca, GEO-RBAC: A spatially aware RBAC, 10th ACM Symp. on Access Control Models and Technologies (SACMAT), 29-37, June 2005.
-
(2005)
10th ACM Symp. on Access Control Models and Technologies (SACMAT)
, pp. 29-37
-
-
Bertino, E.1
Catania, B.2
Damiani, M.L.3
Perlasca, P.4
-
4
-
-
0013142893
-
The KeyNote trust-management system
-
M. Blaze, J. Feigenbaum, J. Ioannidis and A. Keromytis, The KeyNote trust-management system, RFC 2704, 1999.
-
(1999)
RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
5
-
-
0035791053
-
Securing context-aware applications using environment roles
-
May
-
M. J. Covington, W. Long, S. Srinivasan, A. K. Dey, M. Ahamad and G. D. Abowd, Securing context-aware applications using environment roles, 6th ACM Symp. on Access Control Models and Technologies (SACMAT), 10-20, May 2001.
-
(2001)
6th ACM Symp. on Access Control Models and Technologies (SACMAT)
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
6
-
-
0003358457
-
SPKI certificate theory
-
C. M. Ellison, B. Frantz, B. Lampson, R. L. Rivest, B. M. Thomas and T. Ylonen, SPKI certificate theory, RFC 2693, 1999.
-
(1999)
RFC
, vol.2693
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.L.4
Thomas, B.M.5
Ylonen, T.6
-
7
-
-
3042786636
-
Bayesian filtering for location estimation
-
D. Fox, J. Hightower, L. Liao, D. Schulz, and G. Borriello, Bayesian filtering for location estimation, IEEE Pervasive Computing, 2(3), 24-33, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.3
, pp. 24-33
-
-
Fox, D.1
Hightower, J.2
Liao, L.3
Schulz, D.4
Borriello, G.5
-
8
-
-
0033724294
-
Access control meets public key infrastructure, or, assigning roles to strangers
-
A. Herzberg, Y. Mass, J. Mihaeli, D. Naor and Y. Ravid, Access control meets public key infrastructure, or, assigning roles to strangers, IEEE Security and Privacy, 2-14, 2000.
-
(2000)
IEEE Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
9
-
-
30744448197
-
Context sensitive access control
-
June
-
R. J. Hulsebosch, A. H. Salden, M. S. Bargh, P. W. G. Ebben and J. Reitsma, Context sensitive access control, 10th ACM Symp. on Access Control Models and Technologies (SACMAT), 111-119, June 2005.
-
(2005)
10th ACM Symp. on Access Control Models and Technologies (SACMAT)
, pp. 111-119
-
-
Hulsebosch, R.J.1
Salden, A.H.2
Bargh, M.S.3
Ebben, P.W.G.4
Reitsma, J.5
-
10
-
-
0142187737
-
RightSPOT: A novel sense of location for a smart personal object
-
UbiComp 2003
-
J. Krumm, G. Cermak, and E. Horvitz, RightSPOT: a novel sense of location for a smart personal object, UbiComp 2003, LNCS 2864, 36-43, 2003.
-
(2003)
LNCS
, vol.2864
, pp. 36-43
-
-
Krumm, J.1
Cermak, G.2
Horvitz, E.3
-
11
-
-
84882559566
-
SmartMoveX on a graph -an inexpensive active badge tracker
-
UbiComp 2002
-
J. Krumm, L. Williams, and G. Smith, SmartMoveX on a graph -an inexpensive active badge tracker, UbiComp 2002, LNCS 2498, 299-307, 2002.
-
(2002)
LNCS
, vol.2498
, pp. 299-307
-
-
Krumm, J.1
Williams, L.2
Smith, G.3
-
12
-
-
0142156648
-
Inferring high-level behavior from low-level sensors
-
UbiComp 2003
-
D. J. Patterson, L. Liao, D. Fox, and H. Kautz, Inferring high-level behavior from low-level sensors, UbiComp 2003, LNCS 2864, 73-89, 2003.
-
(2003)
LNCS
, vol.2864
, pp. 73-89
-
-
Patterson, D.J.1
Liao, L.2
Fox, D.3
Kautz, H.4
-
13
-
-
0022594196
-
An introduction to hidden Markov models
-
L. R. Rabiner and B. H. Juang, An introduction to hidden Markov models, IEEE ASSP Magazine, 3(1), 4-16, 1986.
-
(1986)
IEEE ASSP Magazine
, vol.3
, Issue.1
, pp. 4-16
-
-
Rabiner, L.R.1
Juang, B.H.2
-
14
-
-
29844445585
-
A presence event package for the Session Initiation Protocol (SIP)
-
J. Rosenberg, A presence event package for the Session Initiation Protocol (SIP), RFC 3856, 2004.
-
(2004)
RFC
, vol.3856
-
-
Rosenberg, J.1
-
15
-
-
84893105662
-
Requirements for policy languages for trust negotiation
-
K. E. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills and L. Yu, Requirements for policy languages for trust negotiation, IEEE Int'l Workshop on Policies for Distributed Systems and Networks (POLICY), 68-79, 2002.
-
(2002)
IEEE Int'l Workshop on Policies for Distributed Systems and Networks (POLICY)
, pp. 68-79
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobson, J.6
Mills, H.7
Yu, L.8
|