-
1
-
-
0001853125
-
The Computer for the 21st Century
-
Sept, reprinted in IEEE Pervasive Computing, pp. 19-25, Jan.-Mar. 2002
-
M. Weiser, "The Computer for the 21st Century," Scientific America, pp. 94-104, Sept. 1991; reprinted in IEEE Pervasive Computing, pp. 19-25, Jan.-Mar. 2002.
-
(1991)
Scientific America
, pp. 94-104
-
-
Weiser, M.1
-
2
-
-
0035428427
-
Pervasive Computing: Vision and Challenges
-
Aug
-
M. Satyanarayanan, "Pervasive Computing: Vision and Challenges," IEEE Personal Communications, pp. 10-17, Aug. 2001.
-
(2001)
IEEE Personal Communications
, pp. 10-17
-
-
Satyanarayanan, M.1
-
3
-
-
0032628781
-
User-friendly access control for public network ports
-
G. Appenzeller, M. Roussopoulos, and M. Baker, "User-friendly access control for public network ports," in Proc. IEEE INFOCOM, pp. 699-707, 1999.
-
(1999)
Proc. IEEE INFOCOM
, pp. 699-707
-
-
Appenzeller, G.1
Roussopoulos, M.2
Baker, M.3
-
4
-
-
2942585235
-
Pervasive authentication domains for automatic pervasive device authorization
-
March
-
R. Sailer and J.R. Giles, "Pervasive authentication domains for automatic pervasive device authorization," in Proc. Second IEEE Annual Conference, pp. 144-148, 14-17 March 2004.
-
(2004)
Proc. Second IEEE Annual Conference
-
-
Sailer, R.1
Giles, J.R.2
-
5
-
-
0038148412
-
A Unified Scheme for Resource Protecion in Automated Trust Negotiation
-
May
-
T. Yu and M. Winslett, "A Unified Scheme for Resource Protecion in Automated Trust Negotiation," in Proc. IEEE Symp. Security and Privacy, pp. 110-122, May 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
-
8
-
-
0029423187
-
A policy based role framework for access control
-
Gaithersburg, USA, Dec
-
E.C. Lupu, D.A. Marriott, M.S. Sloman and N. Yialelis, "A policy based role framework for access control," First ACM/NIST Role Based Access Control Workshop, Gaithersburg, USA, Dec. 1995.
-
(1995)
First ACM/NIST Role Based Access Control Workshop
-
-
Lupu, E.C.1
Marriott, D.A.2
Sloman, M.S.3
Yialelis, N.4
-
9
-
-
0030086382
-
Role based access control models
-
Feb
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role based access control models," IEEE Computer, 29(2):38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
10
-
-
4344567712
-
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
-
Dunedin, New Zealand, January
-
th Australasian Computer Science Conference (ACSC'04), Dunedin, New Zealand, 26(1):41-46, January 2004.
-
(2004)
th Australasian Computer Science Conference (ACSC'04)
, vol.26
, Issue.1
, pp. 41-46
-
-
Pirzada, A.A.1
McDonald, C.2
-
11
-
-
0035577649
-
Trust-based security in pervasive computing environments
-
December
-
Lalana Kagal, Tim Finin, and Anupam Joshi, "Trust-based security in pervasive computing environments," IEEE Computer, 34(12):154-157, December 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.12
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
12
-
-
37349115644
-
An Access Control Model for Ubiquitous Computing Application
-
G. Ya-Jun, H. Fan, Z. Ping-Guo and L. Rong, "An Access Control Model for Ubiquitous Computing Application," in Proc. Second International Conference on Mobile Technology, Applications and Systems, 2005.
-
(2005)
Proc. Second International Conference on Mobile Technology, Applications and Systems
-
-
Ya-Jun, G.1
Fan, H.2
Ping-Guo, Z.3
Rong, L.4
-
14
-
-
35048901065
-
-
H. Q. Ngo, A. Shehzad, K. A. Pham, M. Riaz, S. Liaquat and S. Y. Lee, Developing Context-aware Ubiquitous Computing Systems with a Unified Middleware Framework, Embedded and Ubiquitous Computing (EUC 2004), pp. 672-681, Aug. 2004.
-
H. Q. Ngo, A. Shehzad, K. A. Pham, M. Riaz, S. Liaquat and S. Y. Lee, "Developing Context-aware Ubiquitous Computing Systems with a Unified Middleware Framework," Embedded and Ubiquitous Computing (EUC 2004), pp. 672-681, Aug. 2004.
-
-
-
-
15
-
-
37349044727
-
Intrusion Tolerant Group-based Trust Management Scheme for Wireless Sensor
-
submitted for publication
-
Riaz Ahmed Shaikh et al., "Intrusion Tolerant Group-based Trust Management Scheme for Wireless Sensor Networks", submitted for publication.
-
Networks
-
-
Ahmed Shaikh, R.1
|