메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages

An access control model for ubiquitous computing application

Author keywords

Pervasive computing; RCTN; Trust negotiation

Indexed keywords

INFORMATION RETRIEVAL; MATHEMATICAL MODELS; MOBILE COMPUTING; RESOURCE ALLOCATION; UBIQUITOUS COMPUTING;

EID: 33947141623     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (18)
  • 3
    • 0035791053 scopus 로고    scopus 로고
    • Covington, M. J., Long, W., Srinivasan, S., Dey, A. K., Ahamad, M. and Abowd, G. D., Securing context-aware applications using environment roles. In the Proceedings of the sixth ACM symposium on Access control models and technologies. May 2001, 10-20.
    • Covington, M. J., Long, W., Srinivasan, S., Dey, A. K., Ahamad, M. and Abowd, G. D., Securing context-aware applications using environment roles. In the Proceedings of the sixth ACM symposium on Access control models and technologies. May 2001, 10-20.
  • 5
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in Ad-hoc Networks
    • Asokan, N., Ginzboorg, P., Key agreement in Ad-hoc Networks. Computer Communications, 2000, 23(17):1627-1637.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 6
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for Ad hoc wireless networks
    • In the Proceedings of the 7th International Workshop on Security Protocols, Springer-Verlag
    • Stajano, F., Anderson, R., The resurrecting duckling: security issues for Ad hoc wireless networks. In the Proceedings of the 7th International Workshop on Security Protocols, LNCS 1796, Springer-Verlag, 1999. 172-194.
    • (1999) LNCS , vol.1796 , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 7
    • 84949953635 scopus 로고    scopus 로고
    • The resurrecting duckling - what next?
    • In the Proceedings of the 8th International Workshop on Security Protocols, Springier-Verlag, Berlin Germany, April
    • Stajano, F., The resurrecting duckling - what next? In the Proceedings of the 8th International Workshop on Security Protocols, LNCS 2133, Springier-Verlag, Berlin Germany, April 2000. 204-214.
    • (2000) LNCS , vol.2133 , pp. 204-214
    • Stajano, F.1
  • 9
    • 0035577649 scopus 로고    scopus 로고
    • Trust-based security in ubiquitous computing environments
    • December
    • Kagal, L., Finin, T., Joshi, A., Trust-based security in ubiquitous computing environments. IEEE Computer, December 2001, 34(12):154-157.
    • (2001) IEEE Computer , vol.34 , Issue.12 , pp. 154-157
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 11
    • 1542361507 scopus 로고    scopus 로고
    • Vawdrey, D. K., Sundelin, T. L., Seamons, K. E., Knutson1, C. D., Trust negotiation for authentication and authorization in healthcare information systems, In the Proceedings of the 25th Annual International Conference of the IEEE Engineering In Medicine And Biology Society, Cancun, Mexico, September 2003.
    • Vawdrey, D. K., Sundelin, T. L., Seamons, K. E., Knutson1, C. D., Trust negotiation for authentication and authorization in healthcare information systems, In the Proceedings of the 25th Annual International Conference of the IEEE Engineering In Medicine And Biology Society, Cancun, Mexico, September 2003.
  • 13
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • February
    • Yu, T., Winslett, M., Seamons, K., Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security, February 2003, 6(1): 1-42.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.3
  • 18
    • 33947121636 scopus 로고    scopus 로고
    • Lmsal, P., Requirements for modeling trust in ubiquitous computing and Ad Hoc networks. In HUT TML - Course T-110.557 - Publication ISBN 951-22-6309-2 ISSN 1456-7628 TML-C8, Ad Hoc Mobile Wireless Networks - Research Seminar on Telecommunications Software, Autumn 2002. http://www.tml.hut.fi/Studies/T-110. 557/2002/papers/
    • Lmsal, P., Requirements for modeling trust in ubiquitous computing and Ad Hoc networks. In HUT TML - Course T-110.557 - Publication ISBN 951-22-6309-2 ISSN 1456-7628 TML-C8, Ad Hoc Mobile Wireless Networks - Research Seminar on Telecommunications Software, Autumn 2002. http://www.tml.hut.fi/Studies/T-110. 557/2002/papers/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.