-
4
-
-
35048865391
-
Security and privacy in pervasive computing state of the art and future directions, Springer
-
D Hutter W Stephan M Ullmann 2004 Security and privacy in pervasive computing state of the art and future directions, Springer Lecture Notes in Computer Science 2802 284 289
-
(2004)
Lecture Notes in Computer Science
, vol.2802
, pp. 284-289
-
-
Hutter, D.1
Stephan, W.2
Ullmann, M.3
-
5
-
-
0035428427
-
Pervasive computing: Vision and challenges
-
DOI 10.1109/98.943998
-
M Satyanarayanan 2001 Pervasive computing: Vision and challenges IEEE Personal Communications 8 4 10 17 10.1109/98.943998 10.1109/98.943998 (Pubitemid 33060762)
-
(2001)
IEEE Personal Communications
, vol.8
, Issue.4
, pp. 10-17
-
-
Satyanarayanan, M.1
-
6
-
-
34748888576
-
The security challenges of ubiquitous computing
-
Springer
-
Stajano, F. (2003). The security challenges of ubiquitous computing, Springer. Lecture Notes in Computer Science, 2779, 1. http://www.informatik.uni- trier.de/~ley/db/conf/ches/ches2003.html.
-
(2003)
Lecture Notes in Computer Science
, vol.2779
, pp. 1
-
-
Stajano, F.1
-
10
-
-
77957866755
-
-
UK e-Science, http://www.rcuk.ac.uk/escience/default.htm.
-
-
-
-
11
-
-
77957876091
-
-
Open Science Grid. http://www.opensciencegrid.org/.
-
-
-
-
12
-
-
0001853125
-
The computer for the twenty-first century
-
10.1038/scientificamerican0991-94
-
M Weiser 1991 The computer for the twenty-first century Scientific American 265 3 94 104 10.1038/scientificamerican0991-94
-
(1991)
Scientific American
, vol.265
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
-
13
-
-
84976680345
-
The world is not a desktop
-
10.1145/174800.174801 10.1145/174800.174801
-
M Weiser 1993 The world is not a desktop ACM Interactions 1 1 7 8 10.1145/174800.174801 10.1145/174800.174801
-
(1993)
ACM Interactions
, vol.1
, Issue.1
, pp. 7-8
-
-
Weiser, M.1
-
15
-
-
35048828237
-
Beyond desktop computing: MIT's oxygen project
-
Hedberg, S. (2000). Beyond desktop computing: MIT's oxygen project. IEEE Distributed Systems Online, 1(1).
-
(2000)
IEEE Distributed Systems Online
, vol.1
, Issue.1
-
-
Hedberg, S.1
-
20
-
-
18844414071
-
Towards an authentication middleware to support ubiquitous web access
-
September 2004
-
Zhang, N., Chin, J., Rector, A., Goble, C., & Li, Y. (2004). Towards an authentication middleware to support ubiquitous web access. In Proceedings 28th Annual International Computer Software and Applications Conference (September 2004).
-
(2004)
Proceedings 28th Annual International Computer Software and Applications Conference
-
-
Zhang, N.1
Chin, J.2
Rector, A.3
Goble, C.4
Li, Y.5
-
21
-
-
30744448197
-
Context sensitive access control
-
Hulsebosch, R. J., Salden, A. H., Bargh, M. S., Ebben, P. W. G., & Reitsma, J. (2005). Context sensitive access control. In Proceedings 10th ACM Symposium on Access Control Models and Technologies, pp. 111-119.
-
(2005)
Proceedings 10th ACM Symposium on Access Control Models and Technologies
, pp. 111-119
-
-
Hulsebosch, R.J.1
Salden, A.H.2
Bargh, M.S.3
Ebben, P.W.G.4
Reitsma, J.5
-
22
-
-
27544442589
-
A correlative context-based framework for network intrusion detection system
-
Proceedings - 10th IEEE Symposium on Computers and Communications, ISCC 2005
-
Wang, Y., & Abdel-Wahab, H. M. (2005). A correlative context-based framework for network intrusion detection system. In Proceedings of ISCC, pp. 463-468. (Pubitemid 41543314)
-
(2005)
Proceedings - IEEE Symposium on Computers and Communications
, pp. 463-468
-
-
Wang, Y.1
Abdel-Wahab, H.2
-
23
-
-
77957864264
-
Securing context-aware applications using environmental roles
-
May 2001
-
Covingtion, M. J., Moyer, M., & Ahamad, M. (2001). Securing context-aware applications using environmental roles. In: Proceedings 23rd National Information Systems Security Conference (NISSC) (May 2001), pp. 40-51.
-
(2001)
Proceedings 23rd National Information Systems Security Conference (NISSC)
, pp. 40-51
-
-
Covingtion, M.J.1
Moyer, M.2
Ahamad, M.3
-
24
-
-
84948995473
-
A context-aware security architecture for emerging applications
-
December 2002
-
Covington, M. J., Fogla, P., Zhan, Z., & Ahamad, M. (2002). A context-aware security architecture for emerging applications. In Proceedings Annual Computer Security Applications Conference (ACSAC) (December 2002), pp. 249-258.
-
(2002)
Proceedings Annual Computer Security Applications Conference (ACSAC)
, pp. 249-258
-
-
Covington, M.J.1
Fogla, P.2
Zhan, Z.3
Ahamad, M.4
-
25
-
-
4444246080
-
An Integrated approach to engineer and enforce context constraints in RBAC environments
-
10.1145/1015040.1015043 10.1145/1015040.1015043
-
M Strembeck G Neumann 2004 An Integrated approach to engineer and enforce context constraints in RBAC environments ACM Transactions on Information and System Security 7 3 392 427 10.1145/1015040.1015043 10.1145/1015040.1015043
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.3
, pp. 392-427
-
-
Strembeck, M.1
Neumann, G.2
-
26
-
-
34748863820
-
Context-dependent access control for web-based collaboration environments with role-based approach
-
Springer Lecture Notes in Computer Science
-
Wolf, R., & Schneider, M. (2003). Context-dependent access control for web-based collaboration environments with role-based approach. In Proceedings of the 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (Vol. 2776, pp. 267-278). Springer Lecture Notes in Computer Science. http://www.springerlink.com/content/ 5er2pw19hdmgfhgl/fulltext.html/.
-
(2003)
Proceedings of the 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
, vol.2776
, pp. 267-278
-
-
Wolf, R.1
Schneider, M.2
-
27
-
-
3142653204
-
VOMS, an authorization system for virtual organizations
-
February 2003
-
Alfieri, R., Cecchini, R., Ciaschini, V., dell'Agnello, L., Frohner, A., Gianoli, A., et al. (2003). VOMS, an authorization system for virtual organizations. In Proceedings European Across Grids Conference (February 2003).
-
(2003)
Proceedings European Across Grids Conference
-
-
Alfieri, R.1
Cecchini, R.2
Ciaschini, V.3
Dell'Agnello, L.4
Frohner, A.5
Gianoli, A.6
-
28
-
-
84887853842
-
A community authorization service for group collaboration
-
Pearlman, L., Welch, V., Foster, I., Kesselman, C., & Tuecke, S. (2002). A community authorization service for group collaboration. In Proceedings International Workshop on Policies for Distributed Systems and Networks POLICY'02, pp. 50-59.
-
(2002)
Proceedings International Workshop on Policies for Distributed Systems and Networks POLICY'02
, pp. 50-59
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
29
-
-
0037303408
-
The PERMIS X.509 role-based privilege management infrastructure
-
10.1016/S0167-739X(02)00153-X 10.1016/S0167-739X(02)00153-X
-
DW Chadwick A Otenko 2003 The PERMIS X.509 role-based privilege management infrastructure Future Generation Computer Systems 19 2 277 289 10.1016/S0167-739X(02)00153-X 10.1016/S0167-739X(02)00153-X
-
(2003)
Future Generation Computer Systems
, vol.19
, Issue.2
, pp. 277-289
-
-
Chadwick, D.W.1
Otenko, A.2
-
31
-
-
17644368658
-
X.509 proxy certificates for dynamic delegation
-
April 2004
-
Welch, V., Kesselman, C., Mulmo, O., Pearlman, L., Tuecke, S., Gawor, J., et al. (2004). X.509 proxy certificates for dynamic delegation. In Proceedings 3rd Annual PKI R&D Workshop (April 2004).
-
(2004)
Proceedings 3rd Annual PKI R&D Workshop
-
-
Welch, V.1
Kesselman, C.2
Mulmo, O.3
Pearlman, L.4
Tuecke, S.5
Gawor, J.6
-
34
-
-
35048815776
-
-
Microsoft Research (June 2001), Technical Report MSR-TR-2001-59
-
Glasser, U., Gurevich, Y., & Veanes, M. (2001). Universal Plug and Play Models, Technical Report MSR-TR-2001-59, Microsoft Research (June 2001).
-
(2001)
Universal Plug and Play Models
-
-
Glasser, U.1
Gurevich, Y.2
Veanes, M.3
-
35
-
-
0002425570
-
The JINI architecture for network-centric computing
-
10.1145/306549.306582 10.1145/306549.306582
-
J Waldo 1999 The JINI architecture for network-centric computing Communications of the ACM 7 76 82 10.1145/306549.306582 10.1145/306549.306582
-
(1999)
Communications of the ACM
, vol.7
, pp. 76-82
-
-
Waldo, J.1
-
37
-
-
33750599145
-
Design of OSGi compatible middleware components for mobile multimedia applications, springer
-
10.1007/3-540-36166-9-8 10.1007/3-540-36166-9-8
-
H Eikerling F Berger 2002 Design of OSGi compatible middleware components for mobile multimedia applications, springer Lecture Notes in Computer Science 2515 80 91 10.1007/3-540-36166-9-8 10.1007/3-540-36166-9-8
-
(2002)
Lecture Notes in Computer Science
, vol.2515
, pp. 80-91
-
-
Eikerling, H.1
Berger, F.2
-
41
-
-
0004189634
-
-
Addison-Wesley
-
Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1995) Design patterns. Addison-Wesley.
-
(1995)
Design Patterns
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
42
-
-
10444221273
-
-
May 2004
-
Czajkowski, K., Ferguson, D., Foster, I., Frey, J., Graham, S., Sedukhin, I., et al. (2004). The WS-Resource Framework v1.0, http://www.globus.org/wsrf/ specs/ws-wsrf.pdf (May 2004).
-
(2004)
The WS-Resource Framework v1.0
-
-
Czajkowski, K.1
Ferguson, D.2
Foster, I.3
Frey, J.4
Graham, S.5
Sedukhin, I.6
-
43
-
-
77957864421
-
WS-Notification and the Globus Toolkit 4 WS-Java Core
-
July 2005
-
Sundaram, B. (2005). WS-Notification and the Globus Toolkit 4 WS-Java Core, IBM Developer Works, http://www-128.ibm.com/developerworks/grid/library/ gr-wsngt4/ (July 2005).
-
(2005)
IBM Developer Works
-
-
Sundaram, B.1
-
44
-
-
77957886648
-
Advances in web intelligence, a semantically-rich management system based on {CIM} for the {OGSA} security services
-
June 2005
-
Garcia, F. J., & Clemente, B. G. M., & Gomez-Skarmeta, A. F. (2005). Advances in web intelligence, a semantically-rich management system based on {CIM} for the {OGSA} security services. In Proceedings 3rd International Atlantic Web Intelligence Conference (AWIC) (June 2005), pp. 473-479.
-
(2005)
Proceedings 3rd International Atlantic Web Intelligence Conference (AWIC)
, pp. 473-479
-
-
Garcia, F.J.1
Clemente, B.G.M.2
Gomez-Skarmeta, A.F.3
-
45
-
-
0242276201
-
A policy based approach to security for the semantic web
-
October 2003
-
Kagal, L., Finin, T. W., & Joshi, A. (2003). A policy based approach to security for the semantic web. In Proceedings 2nd International Semantic Web Conference (October 2003), pp. 402-418
-
(2003)
Proceedings 2nd International Semantic Web Conference
, pp. 402-418
-
-
Kagal, L.1
Finin, T.W.2
Joshi, A.3
-
46
-
-
33749660420
-
Adaptive trust negotiation and access control for grids
-
DOI 10.1109/GRID.2005.1542724, 1542724, Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
-
Ryutov, T., Zhou, L., Neuman, C., Foukia, N., Leithead, T., & Seamons, K. E. (2005). Adaptive trust negotiation and access control for Grids. In Proceedings 6th IEEE/ACM International Workshop on Grid Computing (November 2005), pp. 55-62. (Pubitemid 44549202)
-
(2005)
Proceedings - IEEE/ACM International Workshop on Grid Computing
, vol.2005
, pp. 55-62
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Foukia, N.4
Leithead, T.5
Seamons, K.E.6
-
47
-
-
4344696700
-
KAoS policy management for semantic web services
-
10.1109/MIS.2004.31 10.1109/MIS.2004.31
-
A Uszok JM Bradshaw M Johnson R Jeffers A Tate J Dalton, et al. 2004 KAoS policy management for semantic web services IEEE Intelligent Systems 19 4 32 41 10.1109/MIS.2004.31 10.1109/MIS.2004.31
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.4
, pp. 32-41
-
-
Uszok, A.1
Bradshaw, J.M.2
Johnson, M.3
Jeffers, R.4
Tate, A.5
Dalton, J.6
-
48
-
-
79551602978
-
The Semantic Web
-
Berners-Lee, T., Hendler, J. A., & Lassila, O. (2001). The Semantic Web. Scientific American, 284(5), 34-43. http://dret.net/biblio/reference/ber01.
-
(2001)
Scientific American
, vol.284
, Issue.5
, pp. 34-43
-
-
Berners-Lee, T.1
Hendler, J.A.2
Lassila, O.3
-
49
-
-
11144282211
-
-
Handbook of Ontologies in Information Systems. Springer
-
Antoniou, G., & van Harmelen, F. (2004). Web ontology language: OWL. Handbook of Ontologies in Information Systems. Springer, pp. 67-92.
-
(2004)
Web Ontology Language: OWL
, pp. 67-92
-
-
Antoniou, G.1
Van Harmelen, F.2
-
50
-
-
19944412181
-
From sandbox to playground: Dynamic virtual environments in the Grid
-
Keahey, K., Doering, K., & Foster, I. (2004). From sandbox to playground: Dynamic virtual environments in the Grid. In Proceedings 5th IEEE/ACM International Workshop on Grid Computing, pp. 34-42.
-
(2004)
Proceedings 5th IEEE/ACM International Workshop on Grid Computing
, pp. 34-42
-
-
Keahey, K.1
Doering, K.2
Foster, I.3
|