-
1
-
-
33847011964
-
-
J. Al-Muhtadi, A. Ranganathan, R. Campbell, M.D. Mickunas, Cerberus: A context-aware security scheme for smart spaces, in: Proceedings of IEEE International Conference on Pervasive Computing and Communications, PerCom 2003, 2003, pp. 489-496
-
-
-
-
2
-
-
2642560332
-
-
H. Chen, T. Finin, A. Joshi, Semantic web in the context broker architecture, in: Proceedings of 2nd IEEE International Conference on Pervasive Computing and Communications, PerCom 2004, 2004, pp. 277-286
-
-
-
-
3
-
-
84948995473
-
-
M.J. Covington, P. Fogla, Z. Zhan, M. Ahamad, A context-aware security architecture for emerging applications, in: Proceedings of 18th Annual Computer Security Applications Conference, ACSAC 2002, 2002
-
-
-
-
4
-
-
33749654100
-
-
F. Gandon, N. Sadeh, A semantic Ewallet to reconcile privacy and context awareness, in: Proceedings of 2nd International Semantic Web Conference, ISWC2003, 2003
-
-
-
-
6
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
Myles G., Friday A., and Davies N. Preserving privacy in environments with location-based applications. Pervasive Computing 2 1 (2003) 56-64
-
(2003)
Pervasive Computing
, vol.2
, Issue.1
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
7
-
-
33750350790
-
-
U. Hengartner, P. Steenkiste, Avoiding privacy violations caused by context-sensitive services, in: Proceedings of 4th IEEE International Conference on Pervasive Computing and Communications, PerCom 2006, 2006, pp. 222-231
-
-
-
-
8
-
-
85084162149
-
-
L. Bauer, M.A. Schneider, E.W. Felten, A general and flexible access-control system for the web, in: Proceedings of 11th Usenix Security Symposium, 2002, pp. 93-108
-
-
-
-
9
-
-
85084100339
-
-
J. Howell, D. Kotz, End-to-end authorization, in: Proceedings of 4th Symposium on Operating System Design & Implementation, OSDI 2000, 2000, pp. 151-164
-
-
-
-
12
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Adam N.R., and Wortmann J.C. Security-control methods for statistical databases: A comparative study. ACM Computing Surveys (CSUR) 21 4 (1989) 515-556
-
(1989)
ACM Computing Surveys (CSUR)
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
13
-
-
33749670943
-
-
U. Hengartner, Access control to information in pervasive computing environments, Ph.D. Thesis, Computer Science Department, Carnegie Mellon University, available as Technical Report CMU-CS-05-160, August 2005
-
-
-
-
14
-
-
33749654097
-
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen, SPKI certificate theory, RFC 2693, September 1999
-
-
-
-
15
-
-
0348183205
-
Project aura: Towards distraction-free pervasive computing
-
Garlan D., Siewiorek D., Smailagic A., and Steenkiste P. Project aura: Towards distraction-free pervasive computing. IEEE Pervasive Computing 1 2 (2002) 22-31
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.2
, pp. 22-31
-
-
Garlan, D.1
Siewiorek, D.2
Smailagic, A.3
Steenkiste, P.4
-
16
-
-
0035791053
-
-
M.J. Covington, W. Long, S. Srinivasan, A. Dey, M. Ahamad, G. Abowd, Securing context-aware applications using environment roles, in: Proceedings of 6th ACM Symposium on Access Control Models and Technologies, SACMAT '01, 2001, pp. 10-20
-
-
-
-
17
-
-
0242625198
-
-
G. Neumann, M. Strembeck, An approach to engineer and enforce context constraints in an RBAC environment, in: Proceedings of 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, 2003, pp. 65-79
-
-
-
-
20
-
-
0242456739
-
-
P. McDaniel, On context in authorization policy, in: Proceedings of 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, 2003, pp. 80-89
-
-
-
-
21
-
-
3543128965
-
-
W.H. Winsborough, N. Li, Safety in automated trust negotiation, in: Proceedings of 2004 IEEE Symposium on Security and Privacy, 2004, pp. 147-160
-
-
-
|