-
1
-
-
18744370623
-
Dynamic Authentication for High-Performance Networked Applications
-
Napa, California, USA, pp
-
Schneck, P.A., Schwan, K.: Dynamic Authentication for High-Performance Networked Applications. In: Proc. of the 6th International Workshop on Quality of Service (IWQoS 1998) Napa, California, USA, pp. 127-136 (1998)
-
(1998)
Proc. of the 6th International Workshop on Quality of Service (IWQoS
, pp. 127-136
-
-
Schneck, P.A.1
Schwan, K.2
-
2
-
-
30644473909
-
Adaptive Trust Negotiation and Access Control
-
Stockholm, Sweden, pp, ACM Press, New York
-
Ryutov, T., Zhou, R., Neumann, C., Leithead, T., Seamons, K.E.: Adaptive Trust Negotiation and Access Control. In: SACMAT 2005. Proc. of the ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, pp. 139-146. ACM Press, New York (2005)
-
(2005)
SACMAT 2005. Proc. of the ACM Symposium on Access Control Models and Technologies
, pp. 139-146
-
-
Ryutov, T.1
Zhou, R.2
Neumann, C.3
Leithead, T.4
Seamons, K.E.5
-
4
-
-
38449116023
-
The Case for Transient Authentication
-
France, pp, ACM Press, New York
-
Noble, B.D., Corner, M.D.: The Case for Transient Authentication. In: Proc. of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, pp. 24-29. ACM Press, New York (2002)
-
(2002)
Proc. of the 10th ACM SIGOPS European Workshop, Saint-Emilion
, pp. 24-29
-
-
Noble, B.D.1
Corner, M.D.2
-
5
-
-
35048872361
-
-
Covington, M.J., Ahamad, M., Essa, I., Venkateswaran, H.: Parameterized Authentication. In: Samarati, P., Ryan, P.Y A, Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, 3193, pp. 276-292. Springer, Heidelberg (2004)
-
Covington, M.J., Ahamad, M., Essa, I., Venkateswaran, H.: Parameterized Authentication. In: Samarati, P., Ryan, P.Y A, Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 276-292. Springer, Heidelberg (2004)
-
-
-
-
6
-
-
84864711758
-
Quality of Security Service: Adaptive Security. The Handbook of Information Security
-
John Wiley & Sons, Inc, Chichester
-
Levin, T.E., Irvine, C.E., Spyropoulou, E.: Quality of Security Service: Adaptive Security. The Handbook of Information Security. In: Threats, Vulnerabilities, Prevention, Detection and Management, vol. III, John Wiley & Sons, Inc, Chichester (2005)
-
(2005)
Threats, Vulnerabilities, Prevention, Detection and Management
, vol.3
-
-
Levin, T.E.1
Irvine, C.E.2
Spyropoulou, E.3
-
8
-
-
2942625312
-
-
Kouadri Mostéfaoui, G., Brézillon, P.: A Generic Framework for Context-Based Distributed Authorizations. In: Blackburn, P., Ghidini, C., Turner, R.M., Giunchiglia, F. (eds.) CONTEXT 2003. LNCS, 2680, pp. 204-217. Springer, Heidelberg (2003)
-
Kouadri Mostéfaoui, G., Brézillon, P.: A Generic Framework for Context-Based Distributed Authorizations. In: Blackburn, P., Ghidini, C., Turner, R.M., Giunchiglia, F. (eds.) CONTEXT 2003. LNCS, vol. 2680, pp. 204-217. Springer, Heidelberg (2003)
-
-
-
-
9
-
-
30744448197
-
Context sensitive access control
-
Stockholm, Sweden, pp, ACM Press, New York
-
Hulsebosch, R.J., Salden, A.H., Bargh, M.S., Ebben, P.W.G., Reitsma, J.: Context sensitive access control. In: SACMAT 2005. Proc. of the tenth ACM symposium on Access control models and technologies, Stockholm, Sweden, pp. 111-119, ACM Press, New York (2005)
-
(2005)
SACMAT 2005. Proc. of the tenth ACM symposium on Access control models and technologies
, pp. 111-119
-
-
Hulsebosch, R.J.1
Salden, A.H.2
Bargh, M.S.3
Ebben, P.W.G.4
Reitsma, J.5
-
10
-
-
3042647442
-
Reasoning About Uncertain Contexts in Pervasive Computing Environments
-
IEEE, Los Alamitos
-
Ranganathan, A., Al-Muhtadi, J., Campbell, R.H.: Reasoning About Uncertain Contexts in Pervasive Computing Environments. In: Pervasive Computing, vol. 3(2), pp. 62-70. IEEE, Los Alamitos (2004)
-
(2004)
Pervasive Computing
, vol.3
, Issue.2
, pp. 62-70
-
-
Ranganathan, A.1
Al-Muhtadi, J.2
Campbell, R.H.3
-
11
-
-
33747205462
-
On the Brittleness of Software and the Infeasibility of Security Metrics
-
Belovin, S.M.: On the Brittleness of Software and the Infeasibility of Security Metrics. IEEE Security and Privacy 4(4) (2006)
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.4
-
-
Belovin, S.M.1
-
12
-
-
33947120621
-
A Context Management Framework for Supporting Context Aware Distributed Applications
-
van Kranenburg, H., Bargh, M.S., Iacob, S., Peddemors, A.: A Context Management Framework for Supporting Context Aware Distributed Applications. IEEE Communications Magazine 44(8), 67-74 (2006)
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.8
, pp. 67-74
-
-
van Kranenburg, H.1
Bargh, M.S.2
Iacob, S.3
Peddemors, A.4
-
13
-
-
35048875905
-
-
Ranganathan, A., Al-Muhtadi, J., Chetan, S., Campbell, R., Mickunas, M.D.: MiddleWhere: A Middleware for Location Awareness in Ubiquitous Computing Applications. In: Jacobsen, H.-A. (ed.) Middleware 2004. LNCS, 3231, pp. 397-416. Springer, Heidelberg (2004)
-
Ranganathan, A., Al-Muhtadi, J., Chetan, S., Campbell, R., Mickunas, M.D.: MiddleWhere: A Middleware for Location Awareness in Ubiquitous Computing Applications. In: Jacobsen, H.-A. (ed.) Middleware 2004. LNCS, vol. 3231, pp. 397-416. Springer, Heidelberg (2004)
-
-
-
-
14
-
-
80052788393
-
Usability and Privacy in Identity Management Architectures
-
Brankovic, L, Steketee, C, eds, Australia, pp
-
Jøsang, A., AlZomai, M., Suriadi, S.: Usability and Privacy in Identity Management Architectures. In: Brankovic, L., Steketee, C. (eds.) Proc. Fifth Australasian Information Security Workshop Privacy Enhancing Technologies (AISW 2007), Ballarat, Australia, pp. 143-152 (2007)
-
(2007)
Proc. Fifth Australasian Information Security Workshop Privacy Enhancing Technologies (AISW 2007), Ballarat
, pp. 143-152
-
-
Jøsang, A.1
AlZomai, M.2
Suriadi, S.3
-
15
-
-
33745907062
-
The trouble with login: On usability and computer security in ubiquitous computing
-
Bardram, J.: The trouble with login: on usability and computer security in ubiquitous computing. Personal and Ubiquitous Computing 9(6), 357-367 (2005)
-
(2005)
Personal and Ubiquitous Computing
, vol.9
, Issue.6
, pp. 357-367
-
-
Bardram, J.1
-
17
-
-
84902990727
-
Context-Aware Security Policy Agent for Mobile Internet Services
-
Montréal, Québec, Canada, pp
-
Yee, G., Korba, L.: Context-Aware Security Policy Agent for Mobile Internet Services. In: Proc. of the 2005 IFIP International Conference on Intelligence in Communication Systems, Montréal, Québec, Canada, pp. 249-260 (2005)
-
(2005)
Proc. of the 2005 IFIP International Conference on Intelligence in Communication Systems
, pp. 249-260
-
-
Yee, G.1
Korba, L.2
-
18
-
-
33749042338
-
Negotiated Security Policies for E-Services and Web Services
-
San Diego, California, pp, IEEE Computer Society Press, Los Alamitos
-
Yee, G., Korba, L.: Negotiated Security Policies for E-Services and Web Services. In: ICWS 2005. Proc. of the 2005 IEEE International Conference on Web Services, San Diego, California, pp. 605-612. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
ICWS 2005. Proc. of the 2005 IEEE International Conference on Web Services
, pp. 605-612
-
-
Yee, G.1
Korba, L.2
-
19
-
-
84948995473
-
A Context-Aware Security Architecture for Emerging Applications
-
Las Vegas, Nevada, pp
-
Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: A Context-Aware Security Architecture for Emerging Applications. In: ACSAC 2002. Proc. of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, pp. 249-258 (2002)
-
(2002)
ACSAC 2002. Proc. of the 18th Annual Computer Security Applications Conference
, pp. 249-258
-
-
Covington, M.J.1
Fogla, P.2
Zhan, Z.3
Ahamad, M.4
-
21
-
-
24944509415
-
Robust Probabilistic Positioning Based on High-Level Sensor-Fusion and Map Knowledge
-
Technical Report No. 421, ETH Zurich
-
Bohn, J., Vogt, H.: Robust Probabilistic Positioning Based on High-Level Sensor-Fusion and Map Knowledge. Technical Report No. 421, ETH Zurich (2003)
-
(2003)
-
-
Bohn, J.1
Vogt, H.2
|