-
1
-
-
33847708351
-
Pervasive Computing Support for Hospitals: An Overview of the Activity-Based Computing Project in Pervasive
-
January-March
-
Jacob E. Bardram and Henrik B. Christensen. Pervasive Computing Support for Hospitals: An Overview of the Activity-Based Computing Project in Pervasive Computing Vol. 6, No. 1 January-March 2007
-
(2007)
Computing
, vol.6
, Issue.1
-
-
Bardram, J.E.1
Christensen, H.B.2
-
3
-
-
85197329394
-
-
Le Xuan Hung, Tran Van Phuong, Yonil Zhung, Pho Due Giang, Sungyoung Lee, and Young-Koo Lee. Security in Ubiquitous Computing: Problems and Proposed Solution. 12th IEEE Embedded Real Time Computing Systems and its Applications (RTCSA 2006), Sydney , Australia, Aug 2006
-
Le Xuan Hung, Tran Van Phuong, Yonil Zhung, Pho Due Giang, Sungyoung Lee, and Young-Koo Lee. Security in Ubiquitous Computing: Problems and Proposed Solution. 12th IEEE Embedded Real Time Computing Systems and its Applications (RTCSA 2006), Sydney , Australia, Aug 2006
-
-
-
-
4
-
-
46449121160
-
-
Middleware Infrastructure for Context-aware Ubiquitous Computing Systems. Technical Report, Ubiquitous Computing Lab, Kyung Hee University, Korea, http://uclab.khu.ac.kr/camus/go.php?cmd=tr Feb 2005.
-
Middleware Infrastructure for Context-aware Ubiquitous Computing Systems. Technical Report, Ubiquitous Computing Lab, Kyung Hee University, Korea, http://uclab.khu.ac.kr/camus/go.php?cmd=tr Feb 2005.
-
-
-
-
5
-
-
33749077737
-
Research Issues in the Development of Context-aware Middleware Architectures
-
August 05, HongKong
-
Hung Quoc Ngo, Anjum Shehzad, Kim Anh Pham Ngoc, Sungyoung Lee, Manwoo Jeon, "Research Issues in the Development of Context-aware Middleware Architectures", The 11th IEEE International Conference on Embedded and Real-time Computing Systems and Applications (RTCSA 2005), 17-19 August 05, HongKong
-
The 11th IEEE International Conference on Embedded and Real-time Computing Systems and Applications (RTCSA 2005), 17-19
-
-
Hung, Q.1
Shehzad, A.2
Anh, K.3
Ngoc, P.4
Lee, S.5
Jeon, M.6
-
6
-
-
0014636736
-
Dynamic Protection Structures
-
Lampson, B. W., "Dynamic Protection Structures," AFIPS Conference Proceedings, 35, 1969, pp. 27-38
-
(1969)
AFIPS Conference Proceedings
, vol.35
, pp. 27-38
-
-
Lampson, B.W.1
-
8
-
-
46449098303
-
Trusted Computer System Evaluation Criteria (TCSEC)
-
DoD, Trusted Computer System Evaluation Criteria (TCSEC), DoD 5200.28-STD.
-
DoD 5200.28-STD
-
-
DoD1
-
9
-
-
84992227458
-
Proposed NIST Standard for Role-Based Access Control
-
August
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, R. Chandramouli, Proposed NIST Standard for Role-Based Access Control, ACM Transaction on Information and System Security, Vol. 4, No. 3, August 2001, pages 224-274
-
(2001)
ACM Transaction on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
12
-
-
18844418489
-
Context-based access control management in ubiquitous environments
-
Aug
-
A. Corradi, R. Montanari, and D. Tibaldi, "Context-based access control management in ubiquitous environments," Proc. Third IEEE International Symposium on Network Computing and Applications, (NCA'04), pp.253-260, Aug. 2004.
-
(2004)
Proc. Third IEEE International Symposium on Network Computing and Applications, (NCA'04)
, pp. 253-260
-
-
Corradi, A.1
Montanari, R.2
Tibaldi, D.3
-
13
-
-
10644241802
-
-
Marcela D. R et al, Location-aware Access to Hospital information and services. IEEE Transactions on Information Technology in Biomedicine 2004.
-
Marcela D. R et al, Location-aware Access to Hospital information and services. IEEE Transactions on Information Technology in Biomedicine 2004.
-
-
-
-
15
-
-
11244331795
-
Cassandra: Distributed access control policies with tunable expressiveness
-
Pacific Grove, USA, June
-
Becker, M.Y, and Sewell, P. Cassandra: distributed access control policies with tunable expressiveness. Proc. Seventeenth IEEE Computer Security Foundation Workshop, Pacific Grove, USA, June 2004
-
(2004)
Proc. Seventeenth IEEE Computer Security Foundation Workshop
-
-
Becker, M.Y.1
Sewell, P.2
-
16
-
-
0242540373
-
The Tees Confidentiality Model: An authorization model for identities and roles
-
Como, Italy
-
Longstaff, J.J, Lockkyer, MA, and Nicholas, J. The Tees Confidentiality Model: an authorization model for identities and roles. Proc. Eighth ACM Symposium on Access Control Models and Technologies, Como, Italy, 2003
-
(2003)
Proc. Eighth ACM Symposium on Access Control Models and Technologies
-
-
Longstaff, J.J.1
Lockkyer, M.A.2
Nicholas, J.3
-
17
-
-
0002817535
-
The PERMIS X.509 role based privilege management Infrastructure
-
Monterey, USA ACM Press
-
Chadwick, D.W., and Otenko, A.. The PERMIS X.509 role based privilege management Infrastructure. Proc. Seventh ACM Symposium on Access Control Models and Technologies, Monterey, USA (ACM Press, 2002), pp. 135-140
-
(2002)
Proc. Seventh ACM Symposium on Access Control Models and Technologies
, pp. 135-140
-
-
Chadwick, D.W.1
Otenko, A.2
|