-
2
-
-
84900830868
-
Understanding and using context
-
Dey, A.K.: Understanding and using context. Personal and Ubiquitous Computing 5(1) (2001) 4–7
-
(2001)
Personal and Ubiquitous Computing
, vol.5
, Issue.1
, pp. 4-7
-
-
Dey, A.K.1
-
3
-
-
2942618625
-
Models, protocols, and architectures for secure pervasive computing: Challenges and research directions
-
Thomas, R.K., Sandhu, R.S.: Models, protocols, and architectures for secure pervasive computing: Challenges and research directions. In: 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), Orlando, FL, USA (2004) 164–170
-
(2004)
2Nd IEEE Conference on Pervasive Computing and Communications Workshops (Percom 2004 Workshops), Orlando, FL, USA
, pp. 164-170
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
5
-
-
77952965448
-
Provisional authorizations
-
Jajodia, S., Kudo, M., Subrahmanian, V.S.: Provisional authorizations. In: 1st Workshop on Security and Privacy in E-Commerce, Athens, Greece (2000)
-
(2000)
1St Workshop on Security and Privacy in E-Commerce, Athens, Greece
-
-
Jajodia, S.1
Kudo, M.2
Subrahmanian, V.S.3
-
7
-
-
1142309815
-
Provisions and obligations in policy management and security applications
-
Morgan Kaufmann
-
Bettini, C., Jajodia, S., Sean Wang, X., Wijesekera, D.: Provisions and obligations in policy management and security applications. In: 28th International Conference on Very Large Data Bases (VLDB 2002), Hong Kong, China, Morgan Kaufmann (2002) 502–513
-
(2002)
28Th International Conference on Very Large Data Bases (VLDB 2002), Hong Kong, China
, pp. 502-513
-
-
Bettini, C.1
Jajodia, S.2
Sean Wang, X.3
Wijesekera, D.4
-
9
-
-
33746900477
-
Context-sensitive access control model and implementation
-
Shanghai, China, IEEE Computer Society
-
Han, W., Zhang, J., Yao, X.: Context-sensitive access control model and implementation. In: Fifth International Conference on Computer and Information Technology (CIT 2005), Shanghai, China, IEEE Computer Society (2005) 757–763
-
(2005)
Fifth International Conference on Computer and Information Technology (CIT 2005)
, pp. 757-763
-
-
Han, W.1
Zhang, J.2
Yao, X.3
-
10
-
-
2942623979
-
Modeling context-based security policies with contextual graphs
-
Orlando, FL, USA, IEEE Computer Society
-
Kouadri Mostéfaoui, G., Brézillon, P.: Modeling context-based security policies with contextual graphs. In: 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), Orlando, FL, USA, IEEE Computer Society (2004) 28–32
-
(2004)
2Nd IEEE Conference on Pervasive Computing and Communications Workshops (Percom 2004 Workshops)
, pp. 28-32
-
-
Kouadri Mostéfaoui, G.1
Brézillon, P.2
-
11
-
-
84948950552
-
A model for attribute-based user-role assignment
-
Las Vegas, NV, USA, IEEE Computer Society
-
Al-Kahtani, M.A., Sandhu, R.S.: A model for attribute-based user-role assignment. In: 18th Annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, USA, IEEE Computer Society (2002) 353–364
-
(2002)
18Th Annual Computer Security Applications Conference (ACSAC 2002)
, pp. 353-364
-
-
Al-Kahtani, M.A.1
Sandhu, R.S.2
-
14
-
-
33845645782
-
A middleware infrastructure for active spaces
-
Roman, M., Hess, C., Cerqueira, R., Ranganathan, A., Campbell, R.H., Nahrstedt, K.: A middleware infrastructure for active spaces. IEEE Pervasive Computing 1(4) (2002) 74–83
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.4
, pp. 74-83
-
-
Roman, M.1
Hess, C.2
Cerqueira, R.3
Ranganathan, A.4
Campbell, R.H.5
Nahrstedt, K.6
-
15
-
-
0030677524
-
A logical language for expressing authorizations
-
Jajodia, S., Samarati, P., Subrahmanian, V.S.: A logical language for expressing authorizations. In: IEEE Symposium on Security and Privacy, Oakland, CA, USA, IEEE Computer Society (1997) 31–42
-
(1997)
IEEE Symposium on Security and Privacy, Oakland, CA, USA, IEEE Computer Society
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
16
-
-
4544246023
-
Methods for conflict resolution in policy-based management systems
-
Dunlop, N., Indulska, J., Raymond, K.: Methods for conflict resolution in policy-based management systems. In: 7th IEEE International Enterprise Distributed Object Computing Conference, Brisbane, Australia, IEEE Computer Society (2003) 98–109
-
(2003)
7Th IEEE International Enterprise Distributed Object Computing Conference, Brisbane, Australia, IEEE Computer Society
, pp. 98-109
-
-
Dunlop, N.1
Indulska, J.2
Raymond, K.3
-
17
-
-
85025809187
-
Security Frameworks for Open Systems: Access Control Framework
-
ITU-T: Security Frameworks for Open Systems: Access Control Framework. ITU-T Recommendation X.812. (1995)
-
(1995)
ITU-T Recommendation
, vol.10
, pp. 812
-
-
|