-
1
-
-
33750065107
-
Dying for Data
-
October
-
R. Charette, "Dying for Data", IEEE Spectrum, October 2006, pp. 16-21.
-
(2006)
IEEE Spectrum
, pp. 16-21
-
-
Charette, R.1
-
2
-
-
51949111976
-
Remote Patient Monitoring Solutions
-
G. Spekowius and T. Wendler Eds, Springer
-
D. Simons, T. Egami, J. Perry, "Remote Patient Monitoring Solutions", in G. Spekowius and T. Wendler (Eds.), Advances in Healthcare Technology, Springer, 2006, pp. 505-516.
-
(2006)
Advances in Healthcare Technology
, pp. 505-516
-
-
Simons, D.1
Egami, T.2
Perry, J.3
-
8
-
-
0030086382
-
Role-Based Access Control Models
-
Feb
-
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman, "Role-Based Access Control Models", IEEE Computer, vol.29, no.2, Feb 1996, pp. 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
10
-
-
0035791053
-
Securing Context-Aware Applications Using Environments Roles
-
United States, May
-
Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dey, Mustaque Ahahmed, Gregory D. Abowd, "Securing Context-Aware Applications Using Environments Roles", in proceedings of the sixth ACM symposium on Access control models and technologies, United States, May 2001, pp. 10-20.
-
(2001)
proceedings of the sixth ACM symposium on Access control models and technologies
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.K.4
Ahahmed, M.5
Abowd, G.D.6
-
11
-
-
84948995473
-
-
Michael J. Covington, P Fogla, Zhan Zhiyuan, Ahamad, Mustaque Ahahmed, A context-aware security architecture for emerging applications, in Computer Security Applications Conference, December 2002, pp. 249-258.
-
Michael J. Covington, P Fogla, Zhan Zhiyuan, Ahamad, Mustaque Ahahmed, "A context-aware security architecture for emerging applications", in Computer Security Applications Conference, December 2002, pp. 249-258.
-
-
-
-
13
-
-
2942558770
-
Towards context-aware security: An authorization architecture for intranet environments
-
Chris Wullems, Mark Looi, Andrew Clark, "Towards context-aware security: an authorization architecture for intranet environments", in proceedings of the 2nd IEEE Annual Conference on pervasive Computing and Communications Workshops, 2004, pp. 132-137.
-
(2004)
proceedings of the 2nd IEEE Annual Conference on pervasive Computing and Communications Workshops
, pp. 132-137
-
-
Wullems, C.1
Looi, M.2
Clark, A.3
-
14
-
-
33845546153
-
Cryptographically Enforced Personalized Role-Based Access Control
-
S. Fisher-Hubner, K. Rannenberg, L. Yngstrom, S. Lindskog Eds, Springer, USA
-
M. Petković, C. Conrado, M. Hammouténe, "Cryptographically Enforced Personalized Role-Based Access Control", In S. Fisher-Hubner, K. Rannenberg, L. Yngstrom, S. Lindskog (Eds), Security and Privacy in Dynamic Environments, Springer, USA, 2006, pp. 364-376.
-
(2006)
Security and Privacy in Dynamic Environments
, pp. 364-376
-
-
Petković, M.1
Conrado, C.2
Hammouténe, M.3
-
16
-
-
51949114040
-
A Solution for Combining Extended Role-based Access Control with Digital Rights Management
-
Master Thesis, Technical University Eindhoven, August
-
Bart Bouwman, "A Solution for Combining Extended Role-based Access Control with Digital Rights Management", Master Thesis, Technical University Eindhoven, August 2006.
-
(2006)
-
-
Bouwman, B.1
|