-
3
-
-
85169482122
-
-
CHI, G. C. van der Veer and C. Gale, Eds. ACM, Online, Available
-
S. Paul and J. Lai, "Who gets to know what when: configuring privacy permissions in an awareness application," in CHI, G. C. van der Veer and C. Gale, Eds. ACM, 2005, pp. 101-110. [Online]. Available: http://doi.acm.org/10.1145/1054972.1054987
-
(2005)
Who gets to know what when: Configuring privacy permissions in an awareness application
, pp. 101-110
-
-
Paul, S.1
Lai, J.2
-
4
-
-
34548163883
-
An OSGi-based mobile service middleware for 4G adaptive multimedia services
-
Ming Yin and Joachim Fuchs and Thomas Springer and Frank Steuer, "An OSGi-based mobile service middleware for 4G adaptive multimedia services," in ASWN 2006, 2006.
-
(2006)
ASWN 2006
-
-
Yin, M.1
Fuchs, J.2
Springer, T.3
Steuer, F.4
-
5
-
-
51249107480
-
OASIS eXtensible Access Control Markup Language (XACML)
-
"OASIS eXtensible Access Control Markup Language (XACML)," http://oasis-open.org/committees/xacml, 2005.
-
(2005)
-
-
-
6
-
-
84861295423
-
Location disclosure to social relations: Why, when, & what people want to share
-
Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems, 1, Online, Available
-
S. Consolvo, Smith, I, an E., T. Matthews, A. LaMarca, J. Tabert, and P. Powledge, "Location disclosure to social relations: why, when, & what people want to share," in Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems, ser. Privacy 1, vol. 1, 2005, pp. 81-90. [Online]. Available: http://doi.acm.org/10.1145/1054972.1054985
-
(2005)
ser. Privacy
, vol.1
, pp. 81-90
-
-
Consolvo, S.1
Smith, I.2
an, E.3
Matthews, T.4
LaMarca, A.5
Tabert, J.6
Powledge, P.7
-
7
-
-
34548150975
-
-
J. Olson, J. Grudin, and E. Horvitz, Toward Understanding Preferences for Sharing and Privacy, Microsoft Research (MSR), Tech. Rep. MSR-TR-2004-138, Dec. 2004. [Online]. Available: ftp://ftp.research.microsoft. com/pub/tr/TR-2004-138.pdf
-
J. Olson, J. Grudin, and E. Horvitz, "Toward Understanding Preferences for Sharing and Privacy," Microsoft Research (MSR), Tech. Rep. MSR-TR-2004-138, Dec. 2004. [Online]. Available: ftp://ftp.research.microsoft. com/pub/tr/TR-2004-138.pdf
-
-
-
-
8
-
-
0003400251
-
-
MITRE Corporation, Bedford, MA, USA, Technical Report M74-244
-
D. Bell and L. LaPadula, "Secure computer systems: Mathematical foundations and model," MITRE Corporation, Bedford, MA, USA, Technical Report M74-244, 1973.
-
(1973)
Secure computer systems: Mathematical foundations and model
-
-
Bell, D.1
LaPadula, L.2
-
9
-
-
0003400255
-
-
Electronic Systems Div, Air Force, Hanscom AFB, MA, USA, Technical Report ESD-TR-76-372
-
K. Biba, "Integrity considerations for secure computer systems," Electronic Systems Div., Air Force, Hanscom AFB, MA, USA, Technical Report ESD-TR-76-372, 1977.
-
(1977)
Integrity considerations for secure computer systems
-
-
Biba, K.1
-
10
-
-
0016984825
-
Protection in Operating Systems
-
Aug
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, "Protection in Operating Systems," Communications of the ACM, vol. 19, no. 8, pp. 461-471, Aug 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
11
-
-
0030086382
-
Role-Based Access Control Models
-
Feb
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models," IEEE Computer, vol. 29, no. 2, pp. 38-47, Feb 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
12
-
-
0035791053
-
Securing context-aware applications using environment roles
-
Chantilly, Virginia, United States: ACM, May
-
M. Covington, W. Long, S. Srinivasan, A. Dev, M. Ahamad, and G. Abowd, "Securing context-aware applications using environment roles," in Proceedings of the sixth ACM symposium on Access control models and technologies. Chantilly, Virginia, United States: ACM, May 2001, pp. 10-20.
-
(2001)
Proceedings of the sixth ACM symposium on Access control models and technologies
, pp. 10-20
-
-
Covington, M.1
Long, W.2
Srinivasan, S.3
Dev, A.4
Ahamad, M.5
Abowd, G.6
-
13
-
-
0035006262
-
Generalized Role-Based Access Control
-
Los Alamitos, CA: IEEE Computer Society, Apr
-
M. Moyer and M. Ahamad, "Generalized Role-Based Access Control," in Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS-01). Los Alamitos, CA: IEEE Computer Society, Apr 2001, pp. 391-398.
-
(2001)
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS-01)
, pp. 391-398
-
-
Moyer, M.1
Ahamad, M.2
-
14
-
-
15944413918
-
Context sensitivity in role-based access control
-
Jul
-
A. Kumar, N. Karnik, and G. Chafle, "Context sensitivity in role-based access control," ACM SIGOPS Operating System Review, vol. 36, no. 3, pp. 53-66, Jul 2002.
-
(2002)
ACM SIGOPS Operating System Review
, vol.36
, Issue.3
, pp. 53-66
-
-
Kumar, A.1
Karnik, N.2
Chafle, G.3
-
15
-
-
0242709331
-
A context-related authorization and access control method based on RBAC: A case study from the health care domain
-
Monterey, California, USA
-
M. Wilikens, S. Feriti, A. Sanna, and M. Masera, "A context-related authorization and access control method based on RBAC: A case study from the health care domain," in Proceedings of the seventh ACM symposium on Access control models and technologies, Monterey, California, USA, 2002, pp. 117-124.
-
(2002)
Proceedings of the seventh ACM symposium on Access control models and technologies
, pp. 117-124
-
-
Wilikens, M.1
Feriti, S.2
Sanna, A.3
Masera, M.4
-
16
-
-
34548152344
-
-
San Diego, California, USA, Jan, Online, Available
-
G. Zhang and M. Parashar, "Context-aware Dynamic Access Control for Pervasive Applications," San Diego, California, USA, Jan 2004. [Online]. Available: http://www.caip.rutgers.edu/TASSL/Papers/ automate- sesame-ends-04.pdf
-
(2004)
Context-aware Dynamic Access Control for Pervasive Applications
-
-
Zhang, G.1
Parashar, M.2
-
18
-
-
24344501341
-
Access control in collaborative systems
-
Mar
-
W. Tolone, G.-J. Ahn, T. Pai, and S.-P. Hong, "Access control in collaborative systems," ACM Computing Surveys (CSUR), vol. 37, no. 1, pp. 29-41, Mar 2005.
-
(2005)
ACM Computing Surveys (CSUR)
, vol.37
, Issue.1
, pp. 29-41
-
-
Tolone, W.1
Ahn, G.-J.2
Pai, T.3
Hong, S.-P.4
-
19
-
-
34548189516
-
-
P. Osbakk and N. Ryan, A Privacy Enhancing Infrastructure for Context-Awareness, UK-UbiNet webpage, p. 2, September 2003, position Paper for the 1st UK-UbiNet Workshop, Imperial College, London, UK. [Online]. Available: http://www.cs.kent.ac.uk/pubs/2003/ 1769
-
P. Osbakk and N. Ryan, "A Privacy Enhancing Infrastructure for Context-Awareness," UK-UbiNet webpage, p. 2, September 2003, position Paper for the 1st UK-UbiNet Workshop, Imperial College, London, UK. [Online]. Available: http://www.cs.kent.ac.uk/pubs/2003/ 1769
-
-
-
-
20
-
-
34548185960
-
-
M. Y Dan Hong, Vincent Y Shen, Dynamic Privacy Management: a Plug-in Service for the Middleware in Pervasive Computing, in MobileHCI 05, 2002.
-
M. Y Dan Hong, Vincent Y Shen, "Dynamic Privacy Management: a Plug-in Service for the Middleware in Pervasive Computing," in MobileHCI 05, 2002.
-
-
-
-
21
-
-
84937411601
-
A privacy awareness system for ubiquitous computing environments
-
UbiComp '02: Proceedings of the 4th international conference on Ubiquitous Computing, London, UK: Springer-Verlag
-
M. Langheinrich, "A privacy awareness system for ubiquitous computing environments," in UbiComp '02: Proceedings of the 4th international conference on Ubiquitous Computing, ser. Lecture Notes in Computer Science, vol. 2498. London, UK: Springer-Verlag, 2002, pp. 237-245.
-
(2002)
ser. Lecture Notes in Computer Science
, vol.2498
, pp. 237-245
-
-
Langheinrich, M.1
-
22
-
-
84945556728
-
Privacy by design - principles of privacy-aware ubiquitous systems
-
UbiComp '01: Proceedings of the 3rd international conference on Ubiquitous Computing, London, UK: Springer-Verlag
-
_, "Privacy by design - principles of privacy-aware ubiquitous systems," in UbiComp '01: Proceedings of the 3rd international conference on Ubiquitous Computing, ser. Lecture Notes in Computer Science, vol. 2201. London, UK: Springer-Verlag, 2001, pp. 273-291.
-
(2001)
ser. Lecture Notes in Computer Science
, vol.2201
, pp. 273-291
-
-
Langheinrich, M.1
-
24
-
-
2442557513
-
Modeling privacy control in context-aware systems
-
X. Jiang and J. A. Landay, "Modeling privacy control in context-aware systems," IEEE Pervasive Computing, vol. 1, no. 3, pp. 59-63, 2002.
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.3
, pp. 59-63
-
-
Jiang, X.1
Landay, J.A.2
-
26
-
-
29144523383
-
Information exposure control through data manipulation for ubiquitous computing
-
New York, NY, USA: ACM Press
-
B. Dragovic and J. Crowcroft, "Information exposure control through data manipulation for ubiquitous computing," in NSPW '04: Proceedings of the 2004 workshop on New security paradigms. New York, NY, USA: ACM Press, 2005, pp. 57-64.
-
(2005)
NSPW '04: Proceedings of the 2004 workshop on New security paradigms
, pp. 57-64
-
-
Dragovic, B.1
Crowcroft, J.2
|