-
1
-
-
84892214511
-
-
Springer, Heidelberg (Germany) et al., 2006
-
Benantar, M., 2006. Access Control Systems. Springer, Heidelberg (Germany) et al., 2006.
-
(2006)
Access Control Systems
-
-
Benantar, M.1
-
2
-
-
0033645572
-
TRBAC: A temporal role-based access control model
-
Berlin, Germany
-
Bertino, E., Bonatti, P.A. and Ferrari, E., 2000. TRBAC: A Temporal Role-based Access Control Model. Proceedings of the 5th ACM Workshop on Role-Based Access Control (RBAC 2000), Berlin, Germany, pp. 21-30.
-
(2000)
Proceedings of the 5th ACM Workshop on Role-Based Access Control (RBAC 2000)
, pp. 21-30
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
3
-
-
41649091646
-
Policy mapper: Administering location-based access-control policies
-
Bhatti, R., Damiani, M.L., Bettis, D.W., and Bertino, E., 2008. Policy Mapper: Administering Location-Based Access-Control Policies. IEEE Internet Computing, Vol. 12, No. 2, pp. 38-45.
-
(2008)
IEEE Internet Computing
, vol.12
, Issue.2
, pp. 38-45
-
-
Bhatti, R.1
Damiani, M.L.2
Bettis, D.W.3
Bertino, E.4
-
4
-
-
33744789667
-
LoT-RBAC: A location and time-based RBAC model
-
Springer, New York, USA
-
Chandran, S.M., and Joshi, J.B.D., 2005. LoT-RBAC: A Location and Time-Based RBAC Model. Proceedings of Conference on Web Information Systems Engineering (WISE 2005), Springer, New York, USA, pp. 361-375.
-
(2005)
Proceedings of Conference on Web Information Systems Engineering (WISE 2005)
, pp. 361-375
-
-
Chandran, S.M.1
Joshi, J.B.D.2
-
5
-
-
52149085945
-
Data security in location-aware applications: An approach based on RBAC
-
Damiani, M.L, Bertino, E., and Perlasca, P., 2007. Data Security in Location-Aware Applications: An Approach Based on RBAC. International Journal of Information and Computer Security. Vol. 1, No. 1/2, pp. 5-38.
-
(2007)
International Journal of Information and Computer Security
, vol.1
, Issue.1-2
, pp. 5-38
-
-
Damiani, M.L.1
Bertino, E.2
Perlasca, P.3
-
6
-
-
52149099011
-
A security model for mobile processes
-
IEEE, Barcelona, Spain
-
Decker, M., 2008a: A Security Model for Mobile Processes. International Conference on Mobile Business (ICMB '08), IEEE, Barcelona, Spain, pp. 211-220.
-
(2008)
International Conference on Mobile Business (ICMB '08)
, pp. 211-220
-
-
Decker, M.1
-
8
-
-
58049160073
-
An access-control model for mobile computing with spatial constraints
-
INSTICC, Porto, Portugal
-
Decker, M., 2008c. An Access-Control Model for Mobile Computing with Spatial Constraints. Proceedings of the International Conference on e-Business (ICE-B 2008), INSTICC, Porto, Portugal, pp. 185-190.
-
(2008)
Proceedings of the International Conference on E-Business (ICE-B 2008)
, pp. 185-190
-
-
Decker, M.1
-
9
-
-
70349306901
-
Requirements for a location-based access control model
-
ACM, Linz, Austria
-
Decker, M., 2008d. Requirements for a Location-Based Access Control Model. Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia (MoMM), ACM, Linz, Austria, pp. 346.
-
(2008)
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia (MoMM)
, pp. 346
-
-
Decker, M.1
-
11
-
-
0141911037
-
-
Artech House, Norwood, USA
-
Ferraiolo, D.F., Kuhn, D.R., and Chandramouli, R., 2007. Role-Based Access Control (Second Edition). Artech House, Norwood, USA.
-
(2007)
Role-Based Access Control (Second Edition)
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
Chandramouli, R.3
-
13
-
-
24644480838
-
SRBAC: A spatial role-based access control model for mobile systems
-
Gjovik, Norway
-
Hansen, F., and Oleshchuk, V., 2003. SRBAC: A Spatial Role-Based Access Control Model for Mobile Systems. Proceedings of NORDSEC 2003, Gjovik, Norway, pp. 129-141.
-
(2003)
Proceedings of NORDSEC 2003
, pp. 129-141
-
-
Hansen, F.1
Oleshchuk, V.2
-
15
-
-
41549105875
-
A new data encryption algorithm based on the location of mobile users
-
2008
-
Liao, H.-C., and Chao, Y.-H., 2008. A New Data Encryption Algorithm Based on the Location of Mobile Users. Information Technology Journal, Vol. 7, No. 1, 2008, pp. 63-69.
-
(2008)
Information Technology Journal
, vol.7
, Issue.1
, pp. 63-69
-
-
Liao, H.-C.1
Chao, Y.-H.2
-
18
-
-
32444439291
-
Towards a location-based mandatory access control model
-
Ray, L., Kumar, M., 2006. Towards a Location-based Mandatory Access Control Model. Computer & Security, Vol. 25, No. 1, pp. 46-44.
-
(2006)
Computer & Security
, vol.25
, Issue.1
, pp. 46-44
-
-
Ray, L.1
Kumar, M.2
-
19
-
-
85015437589
-
LRBAC: A location-aware role-based access control model
-
Kolkata, India
-
Ray, I., Kumar, M., and Yu, L., 2006. LRBAC: A Location-Aware Role-Based Access Control Model. Proceedings of ICISS (LNCS 4332), Kolkata, India, pp. 147-161.
-
(2006)
Proceedings of ICISS (LNCS 4332)
, pp. 147-161
-
-
Ray, I.1
Kumar, M.2
Yu, L.3
-
21
-
-
0348209180
-
W-RBAC: A workflow security model incorporating controlled overriding of constraints
-
Wainer, J., Barthelmess, P., and Kumar, A., 2003. W-RBAC: A Workflow Security Model Incorporating Controlled Overriding of Constraints. International Journal of Cooperative Information Systems, Vol. 12, No. 4, pp. 455-485.
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
|