-
1
-
-
30744448197
-
Context sensitive access control
-
New York
-
R. J. Hulsebosch, A. H. Salden, M. S. Bargh, P. W. G. Ebben, J. Re-itsma. "Context sensitive access control", in Proc. 1 Oth ACM Sympo-sium on Access Control Models and Technologies (SACMAT '05), New York, 2005, pp. 111-119.
-
(2005)
Proc. 1Oth ACM Sympo-sium on Access Control Models and Technologies (SACMAT '05)
, pp. 111-119
-
-
Hulsebosch, R.J.1
Salden, A.H.2
Bargh, M.S.3
Ebben, P.W.G.4
Re-itsma, J.5
-
2
-
-
84900830868
-
Understanding and using context
-
Springer-Verlag, London
-
A. Dey, "Understanding and Using Context", Personal Ubiquitous Computing, vol.5(1), Springer-Verlag, 2001, pp. 4-7,London.
-
(2001)
Personal Ubiquitous Computing vol.5(1)
, pp. 4-7
-
-
Dey, A.1
-
5
-
-
0028513932
-
Access control: Principles and practice
-
R. Sandhu, P. Samarati, "Access control: Principles and practice", IEEE Communications Magazine, vol.32(9), 1994, pp. 40-48.
-
(1994)
IEEE Communications Magazine, vol.32(9)
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
6
-
-
0030086382
-
Role-based access control models
-
February
-
R. Sandhu, E. Coyne, H. Feinstein, C. Youman, "Role-based access control models", IEEE Computer, vol.29(2), February 1996, pp. 38-47.
-
(1996)
IEEE Computer, vol. 29(2)
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
7
-
-
34249725123
-
An RBAC-based access control model for object-oriented systems offering dynamic aspect features
-
Oxford University Press
-
S-. Chou, "An RBAC-based access control model for object-oriented systems offering dynamic aspect features", IEICE-Trans. Inf. Syst, vol.88(9), Oxford University Press, 2005, pp. 2143-2147.
-
(2005)
IEICE-Trans. Inf. Syst, vol. 88(9)
, pp. 2143-2147
-
-
Chou, S.1
-
8
-
-
33750361128
-
Context-role based access control for context-aware application
-
Springer Berlin/Heidelberg, September
-
S-. Park, Y-. Han, T-. Chung, "Context-role based access control for context-aware application". High Performance Computing and Com-munications, vol.4208, September 2006, Springer Berlin/Heidelberg, pp. 572-580.
-
(2006)
High Performance Computing and Com-munications, vol. 4208
, pp. 572-580
-
-
Park, S.1
Han, Y.2
Chung, T.3
-
9
-
-
0035006262
-
Generalized role-based access control
-
Washington DC, April, IEEE Computer So-ciety
-
M. J. Moyer, M. Ahamad, "Generalized role-based access control",in Proc. 21st International Conference on Distributed Computing Sys-tems (ICDCS '01), Washington DC, April 2001, IEEE Computer So-ciety, pp. 391-398.
-
(2001)
Proc. 21st International Conference on Distributed Computing Sys-tems (ICDCS '01)
, pp. 391-398
-
-
Moyer, M.J.1
Ahamad, M.2
-
10
-
-
84948995473
-
A context-aware se-curity architecture for emerging applications
-
Washing-ton DC, IEEE Computer Society
-
M. J. Covington, P. Fogla, Z. Zhan, M. Ahamad, "A context-aware se-curity architecture for emerging applications", in Proc. 18th Annual Computer Security Applications Conference (ACSAC '02), Washing-ton DC, 2002, pp. 249, IEEE Computer Society.
-
(2002)
Proc. 18th Annual Computer Security Applications Conference (ACSAC '02)
, pp. 249
-
-
Covington, M.J.1
Fogla, P.2
Zhan, Z.3
Ahamad, M.4
-
11
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
New York, ACM Press
-
E. Bertino, P. A. Bonatti, E. Ferrari, "TRBAC: A temporal role-based access control model", ACM Trans. Inf. Syst. Secur., vol.4(3), New York, ACM Press, 2001, pp. 191-233.
-
(2001)
ACM Trans. Inf. Syst. Secur., vol. 4(3)
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
12
-
-
33744900120
-
Role-based access control model for ubiquitous computing environment
-
February, Springer Berlin/Heidelberg
-
S-. Chae, W. Kim, D-. Kim, "Role-based access control model for ubiquitous computing environment", Information Security Applica-tions, vol.3786, February 2006, Springer Berlin/Heidelberg, pp. 354-363.
-
(2006)
Information Security Applica-tions, vol. 3786
, pp. 354-363
-
-
Chae, S.1
Kim, W.2
Kim, D.3
-
13
-
-
0036387050
-
Hybrid role hierarchy for general-ized temporal role based access control model
-
Washington DC, IEEE Computer Society
-
J. Joshi, E. Bertino, A. Ghafoor, "Hybrid role hierarchy for general-ized temporal role based access control model", in Proc. 26th Interna-tional Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment (COMPSAC '02), Washington DC, IEEE Computer Society 2002, pp. 951-956.
-
(2002)
Proc. 26th Interna-tional Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment (COMPSAC '02)
, pp. 951-956
-
-
Joshi, J.1
Bertino, E.2
Ghafoor, A.3
-
15
-
-
34547493429
-
Spatial context in role-based access control
-
Information Security and Cryptology - ICISC 2006: 9th International Conference, Proceedings LNCS
-
H. Zhang, Y. He, Z. Shi, "Spatial context in role-based access control", Information Security and Cryptology-ICISC 2006, vol.4296, November 2006, Springer Berlin/Heidelberg Lecture Notes in Computer Science 2006, pp. 166-178. (Pubitemid 47163818)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4296
, pp. 166-178
-
-
Zhang, H.1
He, Y.2
Shi, Z.3
-
16
-
-
70349305842
-
Context-aware dynamic access control for pervasive applications
-
San Diego, California, January
-
Z. Guangsen, P. Manish, "Context-aware dynamic access control for pervasive applications", in Proc. Communication Netorks and Dis-tributed Systems Modeling and Simulation Conference, San Diego, California, January 2004, pp. 219-225.
-
(2004)
Proc. Communication Netorks and Dis-tributed Systems Modeling and Simulation Conference
, pp. 219-225
-
-
Guangsen, Z.1
Manish, P.2
-
17
-
-
26944487962
-
Context-aware access control mechanism for ubiquitous applications
-
Springer Berlin/Heidelberg, May
-
Y-. Kim, C-. Mon, D. Jeong, J-. Lee, C-. Song, D-. Baik, "Context-aware access control mechanism for ubiquitous applications", Ad-vances in Web Intelligence, Springer Berlin/Heidelberg, May 2005, vol.3528, pp. 236-242.
-
(2005)
Ad-vances in Web Intelligence
, vol.3528
, pp. 236-242
-
-
Kim, Y.1
Mon, C.2
Jeong, D.3
Lee, J.4
Song, C.5
Baik, D.6
-
18
-
-
0142151165
-
A contextual role-based access con-trol authorization model for electronic patient record
-
G. H. M. B. Motta, S. S. Furuie, "A contextual role-based access con-trol authorization model for electronic patient record", IEEE Transac-tions on Information Technology in Biomedicine, vol.7(3), pp. 202-207, 2003.
-
(2003)
IEEE Transac-tions on Information Technology in Biomedicine, vol. 7(3)
, pp. 202-207
-
-
Motta, G.H.M.B.1
Furuie, S.S.2
-
19
-
-
34547371707
-
Enforc-ing access control using risk assessment
-
Washington DC, IEEE Computer Society
-
N. N. Diep, L. X. Hung, Y. Zhung, S. Lee, Y-. Lee, H. Lee, "Enforc-ing access control using risk assessment", in Proc. 4th European Conference on Universal Multiservice Networks ( ECUMN '07), Washington DC, IEEE Computer Society, 2007, pp. 419-424.
-
(2007)
Proc. 4th European Conference on Universal Multiservice Networks ( ECUMN '07)
, pp. 419-424
-
-
Diep, N.N.1
Hung, L.X.2
Zhung, Y.3
Lee, S.4
Lee, Y.5
Lee, H.6
-
20
-
-
0142249938
-
Activity zones for context-aware computing
-
Springer Berlin/Heidelberg Lecture Notes in Computer Science, October 2006.
-
K. K. Konrad, T. Konrad, D. David, S. Howard, D. Trevor, "Activity zones for context-aware computing", UbiComp 2003: Ubiquitous Computing, Springer Berlin/Heidelberg Lecture Notes in Computer Science, vol.2864, October 2006, 2003, pp. 90-106.
-
(2003)
UbiComp 2003: Ubiquitous Computing
, vol.2864
, pp. 90-106
-
-
Konrad, K.K.1
Konrad, T.2
David, D.3
Howard, S.4
Trevor, D.5
-
21
-
-
11244313251
-
A flexible location-context representation
-
Septem-ber
-
F. Meneses, A. Moreira, "A flexible location-context representation", in Proc. 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, (PIMRC 2004), vol.2, Septem-ber 2004, pp. 1065-1069
-
(2004)
Proc. 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, (PIMRC 2004)
, vol.2
, pp. 1065-1069
-
-
Meneses, F.1
Moreira, A.2
-
22
-
-
0007473204
-
An introduction to intrusion detection
-
New York
-
A. Sundaram, "An introduction to intrusion detection", ACM Cross-roads, vol.2(4), New York 1996, pp. 3-7.
-
(1996)
ACM Cross-roads
, vol.2
, Issue.4
, pp. 3-7
-
-
Sundaram, A.1
-
23
-
-
70349313895
-
-
McGraw-Hill Osborne Media, 2003
-
S. Giles, D. Bersinic, MCSA Windows server 2003 all-in-one exam guide (exams 70-270,70-290,70-291), McGraw-Hill Osborne Media, 2003, pp. 614.
-
(2003)
MCSA Windows Server 2003 All-in-one Exam Guide (Exams 70-270, 70-290, 70-291)
, pp. 614
-
-
Giles, S.1
Bersinic, D.2
-
24
-
-
0000399057
-
Decision quality using ranked attribute weights
-
November
-
H. Barron, B. Barrett, "Decision quality using ranked attribute weights", Management Science, vol.42(11), November 1996, pp. 1515-1523.
-
(1996)
Management Science, vol. 42(11)
, pp. 1515-1523
-
-
Barron, H.1
Barrett, B.2
-
25
-
-
0002458367
-
Selecting a best multiattribute alternative with partial in-formation about attribute weights
-
H. Barron, "Selecting a best multiattribute alternative with partial in-formation about attribute weights", Acta Psychologies vol. 80, 1992, pp. 91-103
-
(1992)
Acta Psychologies vol. 80
, pp. 91-103
-
-
Barron, H.1
-
26
-
-
34848927816
-
Comparing methods for multiattribute deci-sion making with ordinal weights
-
Part Special Issue: Algorithms and Computational Methods in Feasibility and Infeasibility, May
-
B. S .Aim, K. S. Park, "Comparing methods for multiattribute deci-sion making with ordinal weights", Computers & Operations Re-search, Part Special Issue: Algorithms and Computational Methods in Feasibility and Infeasibility, vol.35(5), May 2008, pp. 1660-1670.
-
(2008)
Computers & Operations Re-search
, vol.35
, Issue.5
, pp. 1660-1670
-
-
Aim, B.S.1
Park, K.S.2
-
27
-
-
3042647442
-
Reasoning about uncertain contexts in pervasive computing environments
-
Los Alamitos, IEEE Computer Society
-
A. Ranganathan, J. Al-Muhtadi, R. H. Campbell, "Reasoning about uncertain contexts in pervasive computing environments", IEEE Per-vasive Computing, vol.3(2), Los Alamitos, IEEE Computer Society 2004 , pp. 62-70.
-
(2004)
IEEE Per-vasive Computing, vol. 3(2)
, pp. 62-70
-
-
Ranganathan, A.1
Al-Muhtadi, J.2
Campbell, R.H.3
|