메뉴 건너뛰기




Volumn 15, Issue 2, 2010, Pages 267-282

Utilizing semantic knowledge for access control in pervasive and ubiquitous systems

Author keywords

Access control; Context aware; Policy languages; Policy based network management; Semantic web; XACAML

Indexed keywords

ACCESS CONTROL POLICIES; CONTEXT-AWARE; CONTEXT-MANAGEMENT SYSTEMS; FORMAL REPRESENTATIONS; PERVASIVE AND UBIQUITOUS SYSTEMS; PERVASIVE ENVIRONMENTS; POLICY BASED NETWORK MANAGEMENT; POLICY LANGUAGE; POLICY SYSTEMS; PROOF OF CONCEPT; RUNTIMES; SEMANTIC ACCESS; SEMANTIC KNOWLEDGE; SEMANTIC WEB APPROACH; UNDERLYING MECHANISM;

EID: 77952419386     PISSN: 1383469X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11036-009-0180-7     Document Type: Conference Paper
Times cited : (6)

References (25)
  • 1
    • 2942585067 scopus 로고    scopus 로고
    • An ontology for context-aware pervasive computing environments
    • 10.1017/S0269888904000025
    • H Chen T Finin A Joshi 2003 An ontology for context-aware pervasive computing environments Knowl Eng Rev 18 197 207 10.1017/S0269888904000025
    • (2003) Knowl Eng Rev , vol.18 , pp. 197-207
    • Chen, H.1    Finin, T.2    Joshi, A.3
  • 2
    • 77952429435 scopus 로고    scopus 로고
    • November
    • Clark J (1999) Steve derose. W3C, November. http://www.w3.org/TR/xpaths
    • (1999) Steve Derose
    • Clark, J.1
  • 5
    • 33746561253 scopus 로고    scopus 로고
    • Managing access control for presence-based services
    • DOI 10.1109/CNSR.2005.40, 1429953, Proceedings of the 3rd Annual Communication Networks and Services Research Conference
    • Dersingh A, Liscano R, Jost A (2005) Managing access control for presence-based services. In: CNSR '05: proceedings of the 3rd annual communication networks and services research conference (CNSR'05). IEEE, Washington, DC, pp 105-111 (Pubitemid 44130638)
    • (2005) Proceedings of the 3rd Annual Communication Networks and Services Research Conference , vol.2005 , pp. 105-111
    • Dersingh, A.1    Liscano, R.2    Jost, A.3
  • 12
    • 78649822050 scopus 로고    scopus 로고
    • Racer Systems GmbH & Co. KG ver 1.9
    • Racer Systems GmbH & Co. KG (2005) RacerPro reference manual, ver 1.9. http://www.racersystems.com/
    • (2005) RacerPro Reference Manual
  • 17
    • 0242456739 scopus 로고    scopus 로고
    • On context in authorization policy
    • ACM NewYork
    • P McDaniel 2003 On context in authorization policy SACMAT '03: proceedings of the eighth ACM symposium on access control models and technologies ACM NewYork 80 89 10.1145/775412.775422 McDaniel P (2003) On context in authorization policy. In: SACMAT '03: proceedings of the eighth ACM symposium on access control models and technologies. ACM, New York, pp 80-89. http://doi.acm.org/10.1145/775412.775422
    • (2003) SACMAT '03: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies , pp. 80-89
    • McDaniel, P.1
  • 21
    • 54049154464 scopus 로고    scopus 로고
    • Stanford Center for Biomedical Informatics Research Api version 3.3. Stanford University School of Medicine
    • Stanford Center for Biomedical Informatics Research (2007) Protégé-OWL. Api version 3.3. Stanford University School of Medicine
    • (2007) Protégé-OWL
  • 22
    • 33845427407 scopus 로고    scopus 로고
    • A semantic context-aware access control framework for secure collaborations in pervasive computing environments
    • Toninelli A, Montanari R, Kagal L, Lassila O (2006) A semantic context-aware access control framework for secure collaborations in pervasive computing environments. In: International semantic web conference, pp 473-486
    • (2006) International Semantic Web Conference , pp. 473-486
    • Toninelli, A.1    Montanari, R.2    Kagal, L.3    Lassila, O.4
  • 24
    • 25144513579 scopus 로고    scopus 로고
    • Lubm: A benchmark for owl knowledge base systems
    • JHY Guo Z Pan 2005 Lubm: a benchmark for owl knowledge base systems J Web Semantics 3 158 182
    • (2005) J Web Semantics , vol.3 , pp. 158-182
    • Guo, J.H.Y.1    Pan, Z.2
  • 25
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support of active security
    • Yao W, Moody K, Bacon J (2002) A model of OASIS role-based access control and its support of active security. ACM Trans Inf Syst Secur 5(4)
    • (2002) ACM Trans Inf Syst Secur , vol.5 , Issue.4
    • Yao, W.1    Moody, K.2    Bacon, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.