-
3
-
-
15944413918
-
Context Sensitivity in role based access control
-
Kumar, A., M. Karnik, N., and Chafle, G.: Context Sensitivity in role based access control. Operating Systems Reviews, 36(3), 53-66 (2002)
-
(2002)
Operating Systems Reviews
, vol.36
, Issue.3
, pp. 53-66
-
-
Kumar, A.M.1
Karnik, N.2
Chafle, G.3
-
4
-
-
33845427407
-
A semantic context-aware access control framework for secure collaborations in pervasive computing environments
-
Athens, GA, USA: Springer
-
Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments. International Semantic Web Conference (pp. 473-486). Athens, GA, USA: Springer (2006)
-
(2006)
International Semantic Web Conference
, pp. 473-486
-
-
Toninelli, A.1
Montanari, R.2
Kagal, L.3
Lassila, O.4
-
6
-
-
2942558770
-
-
Orlando, Florida, USA IEEE Computer Society
-
Wullems, C., Looi, M., Clark, A.: Towards Context-aware Security: An Authorization Architecture for Intranet Environments. PerCom Workshops, pp. 132-137. Orlando, Florida, USA: IEEE Computer Society (2004)
-
(2004)
Towards Context-aware Security: An Authorization Architecture for Intranet Environments. PerCom Workshops
, pp. 132-137
-
-
Wullems, C.1
Looi, M.2
Clark, A.3
-
7
-
-
33645696376
-
Using context and similarity for face and location identification
-
San Jose, California: IS&TSPIE Press
-
Davis, M., Smith, M., Stentiford, F., Bamidele, A., Canny, J., Good, N., King, A., Janakiraman, R.. Using Context and Similarity for Face and Location Identification. 18th Annual Symposium on Electronic Imaging Science and Technology Internet Imaging. San Jose, California: IS&TSPIE Press (2006)
-
(2006)
18th Annual Symposium on Electronic Imaging Science and Technology Internet Imaging
-
-
Davis, M.1
Smith, M.2
Stentiford, F.3
Bamidele, A.4
Canny, J.5
Good, N.6
King, A.7
Janakiraman, R.8
-
8
-
-
84995388495
-
Context-aware multimedia computing in the intelligent hospital
-
Kolding, Denmark: ACM
-
Mitchell, S., Spiteri, M. D., Bates, J., and Coulouris, G.: Context-Aware Multimedia Computing in the Intelligent Hospital. SIGOPS EW2000, the Ninth ACM SIGOPS European Workshop (pp. 13-18). Kolding, Denmark: ACM (2000)
-
(2000)
SIGOPS EW2000, the Ninth ACM SIGOPS European Workshop
, pp. 13-18
-
-
Mitchell, S.1
Spiteri, M.D.2
Bates, J.3
Coulouris, G.4
-
10
-
-
63649149206
-
Logic, knowledge representation, and bayesian decision theory
-
London, UK: Springer
-
Poole, D.: Logic, Knowledge Representation, and Bayesian Decision Theory. Computational Logic, pp. 70-86. London, UK: Springer (2000)
-
(2000)
Computational Logic
, pp. 70-86
-
-
Poole, D.1
-
12
-
-
0035568918
-
A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications
-
Dey, A. K., Abowd, G. D., Salber, D.: A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications. Human-Computer Interaction 16, 97-166 (2001)
-
(2001)
Human-computer Interaction
, vol.16
, pp. 97-166
-
-
Dey, A.K.1
Abowd, G.D.2
Salber, D.3
-
13
-
-
58149231807
-
Hybrid approach to collaborative context-aware service platform for pervasive computing
-
Dejene, E., Scuturici, V.-M., Brunie, L.: Hybrid Approach to Collaborative Context-Aware Service Platform for Pervasive Computing. Journal of Computers (JCP), 40-50 (2008)
-
(2008)
Journal of Computers (JCP)
, pp. 40-50
-
-
Dejene, E.1
Scuturici, V.-M.2
Brunie, L.3
-
14
-
-
84890214591
-
-
Wang, X., Zhang, D., Gu, T., Keng Pung, H.: Ontology Based Context Modeling and Reasoning using OWL. PerCom Workshops. Orlando, Florida, USA: IEEE (2004)
-
(2004)
Ontology Based Context Modeling and Reasoning Using OWL. PerCom Workshops. Orlando, Florida, USA: IEEE
-
-
Wang, X.1
Zhang, D.2
Gu, T.3
Pung, K.H.4
-
15
-
-
20844435938
-
A trust-based context-aware access control model for web-services
-
Bhatti, R., Bertino, E., Ghafoor, A.: A Trust-Based Context-Aware Access Control Model for Web-Services. Distributed and Parallel Databases, 83-105 (2005)
-
(2005)
Distributed and Parallel Databases
, pp. 83-105
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
-
17
-
-
84948995473
-
-
Las Vegas, NV, USA IEEE Computer Society
-
J. Covington, M., Fogla, P., Zhan, Z., Ahamad, M.: A Context-Aware Security Architecture for Emerging Applications. ACSAC 2002 (pp. 249-260). Las Vegas, NV, USA: IEEE Computer Society (2002)
-
(2002)
A Context-aware Security Architecture for Emerging Applications. ACSAC 2002
, pp. 249-260
-
-
Covington, J.M.1
Fogla, P.2
Zhan, Z.3
Ahamad, M.4
-
18
-
-
0035791053
-
Securing context-aware applications using environment roles
-
Chantilly, Virginia, USA: ACM
-
J. Covington, M., Long, W., Srinivasan, S., K. Dey, A., Ahamad, M., D. Abowd, G.: Securing context-aware applications using environment roles. SACMAT 2001, pp. 10-20. Chantilly, Virginia, USA: ACM (2001)
-
(2001)
SACMAT 2001
, pp. 10-20
-
-
Covington, J.M.1
Long, W.2
Srinivasan, S.K.3
Dey, A.4
Ahamad, M.D.5
Abowd, G.6
-
19
-
-
34247380764
-
Supporting location-based conditions in access control policies
-
Taipei, Taiwan: ACM
-
Ardagna, C. A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Supporting location-based conditions in access control policies. ASIACCS 2006, pp. 212-222, Taipei, Taiwan: ACM (2006)
-
(2006)
ASIACCS 2006
, pp. 212-222
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
De Capitani Di Vimercati, S.4
Samarati, P.5
-
20
-
-
84890213395
-
-
Retrieved 02 16
-
IBM. QBIC - DB2 Image Extenders. Retrieved 02 16, from http://wwwqbic.almaden. ibm.com (2008)
-
(2008)
IBM. QBIC - DB2 Image Extenders
-
-
-
21
-
-
0032665915
-
Query processing issues in image (multimedia) databases
-
ICDE, Sydney, Australia
-
Nepal, S., V. Ramakrishna, M.: Query Processing Issues in Image (Multimedia) Databases. International Conference on Data Engineering (ICDE), pp. 22-29, Sydney, Australia (1999)
-
(1999)
International Conference on Data Engineering
, pp. 22-29
-
-
Nepal, S.V.1
Ramakrishna, M.2
-
23
-
-
84890225061
-
-
Retrieved 01 02
-
Lab, efg's Computer. Image Processing. Retrieved 01 02, from http://www.efg2.com/Lab/Library/ImageProcessing/SoftwarePackages.htm, (2008)
-
(2008)
Lab, Efg's Computer. Image Processing
-
-
-
26
-
-
34748881498
-
Colour object recognition combining motion descriptors, zernike moments and support vector machine
-
Paris - France
-
Smach, F., Lemaitre, C., Miteran, J., Gauthier, J. P., Abid, M.: Colour Object recognition combining Motion Descriptors, Zernike Moments and Support Vector Machine. IEEE Industrial Electronics, IECON, pp. 3238-3242, Paris - France (2006)
-
(2006)
IEEE Industrial Electronics, IECON
, pp. 3238-3242
-
-
Smach, F.1
Lemaitre, C.2
Miteran, J.3
Gauthier, J.P.4
Abid, M.5
-
27
-
-
0001655091
-
A generalization of the bayesian inference
-
P. Dempster, A.: A Generalization of the Bayesian Inference. Journal of Royal Statistical, 205-447 (1968)
-
(1968)
Journal of Royal Statistical
, pp. 205-447
-
-
Dempster, P.A.1
-
28
-
-
70450214980
-
Privacy intrusion detection using dynamic Bayesian networks
-
Fredericton, New Brunswick, Canada
-
th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet, pp. 208-215, Fredericton, New Brunswick, Canada (2006)
-
(2006)
th International Conference on Electronic Commerce: The New E-commerce: Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet
, pp. 208-215
-
-
An, X.1
Jutla, D.2
Cercone, N.3
-
29
-
-
34748870795
-
A framework for an adaptive intrusion detection system using bayesian network
-
New Brunswick, New Jersey, USA Computer Science
-
Jemili, F., Zaghdoud, M., Ben Ahmed, M.: A Framework for an Adaptive Intrusion Detection System using Bayesian Network. ISI, pp. 66-70, New Brunswick, New Jersey, USA Computer Science (2007)
-
(2007)
ISI
, pp. 66-70
-
-
Jemili, F.1
Zaghdoud, M.2
Ahmed, B.M.3
|