메뉴 건너뛰기




Volumn , Issue , 2007, Pages 419-424

Enforcing access control using risk assessment

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; ADAPTIVE CONTROL SYSTEMS; INTRUSION DETECTION; RISK ASSESSMENT; UBIQUITOUS COMPUTING;

EID: 34547371707     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ECUMN.2007.19     Document Type: Conference Paper
Times cited : (55)

References (13)
  • 1
    • 30744448197 scopus 로고    scopus 로고
    • R.J. Hulsebosch , A.H. Salden, M.S. Bargh, P.W.G. Ebben, and J. Reitsma, Context Sensitive Access Control, In proceedings of the tenth ACM symposium on Access control models and technologies, Stockholm, Sweden, 2005.
    • R.J. Hulsebosch , A.H. Salden, M.S. Bargh, P.W.G. Ebben, and J. Reitsma, "Context Sensitive Access Control", In proceedings of the tenth ACM symposium on Access control models and technologies, Stockholm, Sweden, 2005.
  • 2
    • 0035577649 scopus 로고    scopus 로고
    • Trust-based security in pervasive computing environments
    • December
    • Lalana Kagal, Tim Finin, and Anupam Joshi, "Trust-based security in pervasive computing environments", IEEE Computer, December 2001.
    • (2001) IEEE Computer
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 3
    • 2442549069 scopus 로고    scopus 로고
    • Using Trust for Secure Collaboration in Uncertain Environments
    • July-September
    • V. Cahill, B. Shand, and E.Gray et al, "Using Trust for Secure Collaboration in Uncertain Environments", Pervasive Computing, July-September 2003, vol. 2, no. 3, pp. 52-61.
    • (2003) Pervasive Computing , vol.2 , Issue.3 , pp. 52-61
    • Cahill, V.1    Shand, B.2    Gray, E.3
  • 4
    • 24944456051 scopus 로고    scopus 로고
    • Risk models for trust-based access control (TBAC)
    • Proceedings of the Third Annual Conference on Trust Management iTrust 2005, of, Springer-Verlag, May
    • Nathan Dimmock, Jean Bacon, David Ingram, and Ken Moody, "Risk models for trust-based access control (TBAC)", In Proceedings of the Third Annual Conference on Trust Management (iTrust 2005), volume 3477 of LNCS. Springer-Verlag, May 2005.
    • (2005) LNCS , vol.3477
    • Dimmock, N.1    Bacon, J.2    Ingram, D.3    Moody, K.4
  • 6
    • 33846267322 scopus 로고    scopus 로고
    • Seventh IEEE International Symposium on Multimedia (ISM'05)
    • ism, pp
    • Hassan Jameel, Le Xuan Hung, Umar Kalim, Ali Sajjad, Sungyoung Lee, and Young-Koo Lee, "A Trust Model for Ubiquitous Systems based on Vectors of Trust Values", Seventh IEEE International Symposium on Multimedia (ISM'05), 2005, ism, pp. 674-679.
    • (2005) , pp. 674-679
    • Jameel, H.1    Xuan Hung, L.2    Kalim, U.3    Sajjad, A.4    Lee, S.5    Lee, Y.6
  • 7
    • 33645980270 scopus 로고    scopus 로고
    • A General Risk Assessment of Security in Pervasive Computing
    • Technical Report TCD-CS-2003-45, Department of Computer Science, Trinity College Dublin, 6 November
    • Y. Chen, C. Jensen, E. Gray, V. Cahill and J-M Seigneur, "A General Risk Assessment of Security in Pervasive Computing", Technical Report TCD-CS-2003-45, Department of Computer Science, Trinity College Dublin, 6 November 2003.
    • (2003)
    • Chen, Y.1    Jensen, C.2    Gray, E.3    Cahill, V.4    Seigneur, J.-M.5
  • 10
    • 58849159980 scopus 로고
    • Department of Philosophy and the History of Technology, Royal Institute of Technology KTH, Stockholm
    • Sven Ove Hansson, Decision Theory: A Brief Introduction, Department of Philosophy and the History of Technology, Royal Institute of Technology (KTH), Stockholm, 1994.
    • (1994) Decision Theory: A Brief Introduction
    • Ove Hansson, S.1
  • 11
    • 34547248822 scopus 로고    scopus 로고
    • M. J. Moyer M. J. Covington and M. Ahamad, Generalized role-based access control for securing future applications, In 23rd National Information Systems Security Conference, (NISSC 2000), Baltimore, Md, USA, October 2000.
    • M. J. Moyer M. J. Covington and M. Ahamad, "Generalized role-based access control for securing future applications", In 23rd National Information Systems Security Conference, (NISSC 2000), Baltimore, Md, USA, October 2000.
  • 13


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.