메뉴 건너뛰기




Volumn , Issue , 2006, Pages 497-502

A context, rule and role-based access control model in enterprise pervasive computing environment

Author keywords

Access control model; Context; Pervasive computing; Role; Rule; Security

Indexed keywords

ACCESS CONTROL; DATA PROCESSING; MATHEMATICAL MODELS; SOFTWARE PROTOTYPING;

EID: 38649120843     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SPCA.2006.297443     Document Type: Conference Paper
Times cited : (18)

References (12)
  • 2
    • 0001853125 scopus 로고
    • The Computer for the 21st Century
    • Weiser M. The Computer for the 21st Century. Scientific American, 1991, 265 (3) : 94-104.
    • (1991) Scientific American , vol.265 , Issue.3 , pp. 94-104
    • Weiser, M.1
  • 3
    • 84948950552 scopus 로고    scopus 로고
    • M. Al-Kahtani and R. Sandhu. A Model for AttributeBased User-Role Assignment. In Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA, pages 353-362, December 2002.
    • M. Al-Kahtani and R. Sandhu. A Model for AttributeBased User-Role Assignment. In Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA, pages 353-362, December 2002.
  • 5
    • 30644464563 scopus 로고    scopus 로고
    • Rule Support for Role-Based Access Control
    • June
    • A. Kern, C. Walhom. Rule Support for Role-Based Access Control. SACMAT'05, June, 2005.
    • (2005) SACMAT'05
    • Kern, A.1    Walhom, C.2
  • 8
    • 2942618626 scopus 로고    scopus 로고
    • A. Tripathi, T. Ahmed, D. Kulkarni, R. Kumar, K. Kashiramka. Context-Based Secure Resource Access in Pervasive Computing Environments. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW04). IEEE 2004.
    • A. Tripathi, T. Ahmed, D. Kulkarni, R. Kumar, K. Kashiramka. Context-Based Secure Resource Access in Pervasive Computing Environments. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW04). IEEE 2004.
  • 9
    • 4444246080 scopus 로고    scopus 로고
    • Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments
    • August
    • M. Strembeck, G. Neumanna. Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments. ACM Transactions on Information and System Security, Vol. 7, No. 3, August 2004
    • (2004) ACM Transactions on Information and System Security , vol.7 , Issue.3
    • Strembeck, M.1    Neumanna, G.2
  • 10
    • 38649120951 scopus 로고    scopus 로고
    • A. Held, S. Buchholz, A. Schill. Modeling of Context Information for Pervasive Computing Applications. Proc. of the 6th World Multiconference on Systemics, Cybernetics and Informatics (SCI2002).
    • A. Held, S. Buchholz, A. Schill. Modeling of Context Information for Pervasive Computing Applications. Proc. of the 6th World Multiconference on Systemics, Cybernetics and Informatics (SCI2002).
  • 12
    • 38649117693 scopus 로고    scopus 로고
    • http://www.ilog.com.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.