-
1
-
-
33847011964
-
Cerberus: A context-aware security scheme for smart spaces
-
March
-
J. Al-Muhtadi, A. Ranganathan, R. Campbell, and M. D. Mickunas. Cerberus: A Context-Aware Security Scheme for Smart Spaces. In Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom 2003), pages 489-496, March 2003.
-
(2003)
Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom 2003)
, pp. 489-496
-
-
Al-Muhtadi, J.1
Ranganathan, A.2
Campbell, R.3
Mickunas, M.D.4
-
2
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
November
-
J. Bacon, K. Moody, and W. Yao. A Model of OASIS Role-Based Access Control and its Support for Active Security. ACM Transactions on Information and System Security (TISSEC), 5(4):492-540, November 2002.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
6
-
-
0035791053
-
Securing context-aware applications using environment roles
-
May
-
M. J. Covington, W. Long, S. Srinivasan, A. Dey, M. Ahamad, and G. Abowd. Securing Context-Aware Applications Using Environment Roles. In Proceedings of 6th ACM Symposium on Access Control Models and Technologies (SACMAT '01), pages 10-20, May 2001.
-
(2001)
Proceedings of 6th ACM Symposium on Access Control Models and Technologies (SACMAT '01)
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, G.6
-
7
-
-
0003358457
-
SPKI certificate theory
-
September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI Certificate Theory. RFC 2693, September 1999.
-
(1999)
RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
9
-
-
0348183205
-
Project aura: Towards distraction-free pervasive computing
-
April-June
-
D. Garlan, D. Siewiorek, A. Smailagic, and P. Steenkiste. Project Aura: Towards Distraction-Free Pervasive Computing. IEEE Pervasive Computing, 1(2):22-31, April-June 2002.
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.2
, pp. 22-31
-
-
Garlan, D.1
Siewiorek, D.2
Smailagic, A.3
Steenkiste, P.4
-
10
-
-
33745847570
-
-
PhD thesis, Computer Science Department, Carnegie Mellon University, August. Available as Technical Report CMU-CS-05-160
-
U. Hengartner. Access Control to Information in Pervasive Computing Environments. PhD thesis, Computer Science Department, Carnegie Mellon University, August 2005. Available as Technical Report CMU-CS-05-160.
-
(2005)
Access Control to Information in Pervasive Computing Environments
-
-
Hengartner, U.1
-
14
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
January-March
-
G. Myles, A. Friday, and N. Davies. Preserving Privacy in Environments with Location-Based Applications. Pervasive Computing, 2(1):56-64, January-March 2003.
-
(2003)
Pervasive Computing
, vol.2
, Issue.1
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
17
-
-
84859685641
-
-
Claymore Systems. PureTLS. http://www.rtfm.com/puretls/.
-
PureTLS
-
-
|