-
1
-
-
30744448197
-
-
R.J. Hulsebosch , A.H. Salden, M.S. Bargh, P.W.G. Ebben, and J. Reitsma, Context Sensitive Access Control, In proceedings of the tenth ACM symposium on Access control models and technologies, Stockholm, Sweden, 2005.
-
R.J. Hulsebosch , A.H. Salden, M.S. Bargh, P.W.G. Ebben, and J. Reitsma, "Context Sensitive Access Control", In proceedings of the tenth ACM symposium on Access control models and technologies, Stockholm, Sweden, 2005.
-
-
-
-
2
-
-
0035577649
-
Trust-based security in pervasive computing environments
-
December
-
Lalana Kagal, Tim Finin, and Anupam Joshi, "Trust-based security in pervasive computing environments", IEEE Computer, December 2001.
-
(2001)
IEEE Computer
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
3
-
-
2442549069
-
Using Trust for Secure Collaboration in Uncertain Environments
-
July-September
-
V. Cahill, B. Shand, and E.Gray et al, "Using Trust for Secure Collaboration in Uncertain Environments", Pervasive Computing, July-September 2003, vol. 2, no. 3, pp. 52-61.
-
(2003)
Pervasive Computing
, vol.2
, Issue.3
, pp. 52-61
-
-
Cahill, V.1
Shand, B.2
Gray, E.3
-
4
-
-
24944456051
-
Risk models for trust-based access control (TBAC)
-
Proceedings of the Third Annual Conference on Trust Management iTrust 2005, of, Springer-Verlag, May
-
Nathan Dimmock, Jean Bacon, David Ingram, and Ken Moody, "Risk models for trust-based access control (TBAC)", In Proceedings of the Third Annual Conference on Trust Management (iTrust 2005), volume 3477 of LNCS. Springer-Verlag, May 2005.
-
(2005)
LNCS
, vol.3477
-
-
Dimmock, N.1
Bacon, J.2
Ingram, D.3
Moody, K.4
-
5
-
-
31844442012
-
Risk assessment in distributed authorization
-
Fairfax, VA, USA, November 11-11
-
Peter Chapin, Christian Skalka, and X. Sean Wang, "Risk assessment in distributed authorization", Proceedings of the 2005 ACM workshop on Formal methods in security engineering, Fairfax, VA, USA, November 11-11, 2005.
-
(2005)
Proceedings of the 2005 ACM workshop on Formal methods in security engineering
-
-
Chapin, P.1
Skalka, C.2
Sean Wang, X.3
-
6
-
-
33846267322
-
Seventh IEEE International Symposium on Multimedia (ISM'05)
-
ism, pp
-
Hassan Jameel, Le Xuan Hung, Umar Kalim, Ali Sajjad, Sungyoung Lee, and Young-Koo Lee, "A Trust Model for Ubiquitous Systems based on Vectors of Trust Values", Seventh IEEE International Symposium on Multimedia (ISM'05), 2005, ism, pp. 674-679.
-
(2005)
, pp. 674-679
-
-
Jameel, H.1
Xuan Hung, L.2
Kalim, U.3
Sajjad, A.4
Lee, S.5
Lee, Y.6
-
7
-
-
33645980270
-
A General Risk Assessment of Security in Pervasive Computing
-
Technical Report TCD-CS-2003-45, Department of Computer Science, Trinity College Dublin, 6 November
-
Y. Chen, C. Jensen, E. Gray, V. Cahill and J-M Seigneur, "A General Risk Assessment of Security in Pervasive Computing", Technical Report TCD-CS-2003-45, Department of Computer Science, Trinity College Dublin, 6 November 2003.
-
(2003)
-
-
Chen, Y.1
Jensen, C.2
Gray, E.3
Cahill, V.4
Seigneur, J.-M.5
-
8
-
-
84946400970
-
Risk Probability Estimating Based on Clustering
-
West Point, New York, U.S.A, June
-
Y. Chen, C. Jensen, E. Gray, and J-M. Seigneur, "Risk Probability Estimating Based on Clustering", In Proceedings of the 4th IEEE Anual Information Assurance Workshop, West Point, New York, U.S.A., June 2003.
-
(2003)
Proceedings of the 4th IEEE Anual Information Assurance Workshop
-
-
Chen, Y.1
Jensen, C.2
Gray, E.3
Seigneur, J.-M.4
-
9
-
-
4143058053
-
Using Trust and Risk in Role-Based Access Control Policies
-
Nathan Dimmock and Andrá Belokosztolszki and David David Eyers, Jean Bacon, Ken Moody, "Using Trust and Risk in Role-Based Access Control Policies", Proceedings of Symposium on Access Control Models and Technologies, 2004.
-
(2004)
Proceedings of Symposium on Access Control Models and Technologies
-
-
Dimmock, N.1
Belokosztolszki, A.2
David Eyers, D.3
Bacon, J.4
Moody, K.5
-
10
-
-
58849159980
-
-
Department of Philosophy and the History of Technology, Royal Institute of Technology KTH, Stockholm
-
Sven Ove Hansson, Decision Theory: A Brief Introduction, Department of Philosophy and the History of Technology, Royal Institute of Technology (KTH), Stockholm, 1994.
-
(1994)
Decision Theory: A Brief Introduction
-
-
Ove Hansson, S.1
-
11
-
-
34547248822
-
-
M. J. Moyer M. J. Covington and M. Ahamad, Generalized role-based access control for securing future applications, In 23rd National Information Systems Security Conference, (NISSC 2000), Baltimore, Md, USA, October 2000.
-
M. J. Moyer M. J. Covington and M. Ahamad, "Generalized role-based access control for securing future applications", In 23rd National Information Systems Security Conference, (NISSC 2000), Baltimore, Md, USA, October 2000.
-
-
-
-
12
-
-
33645158709
-
Context-Aware Dynamic Access Control for Pervasive Applications
-
San Diego, CA, USA, January
-
Zhang, G. and Parashar, M., "Context-Aware Dynamic Access Control for Pervasive Applications", In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2004), Western MultiConference (WMC), San Diego, CA, USA, January 2004.
-
(2004)
Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2004), Western MultiConference (WMC)
-
-
Zhang, G.1
Parashar, M.2
-
13
-
-
62349105610
-
Developing Context-Aware Ubiquitous Computing Systems with a Unified Middleware Framework
-
Aizu-Wakamatsu City, Japan, 25-27 August
-
Hung Q. Ngo, Anjum Shehzad, and S.Y.Lee, "Developing Context-Aware Ubiquitous Computing Systems with a Unified Middleware Framework", The International Conference on Embedded and Ubiquitous Computing (EUC04), Aizu-Wakamatsu City, Japan, 25-27 August, 2004.
-
(2004)
The International Conference on Embedded and Ubiquitous Computing (EUC04)
-
-
Ngo, H.Q.1
Shehzad, A.2
Lee, S.Y.3
|