-
2
-
-
18744414770
-
Context-based access control for ubiquitous service provisioning
-
IEEE Computer Society
-
Corradi, A.; Montanari, R.; and Tibaldi, D. 2004. Context-based access control for ubiquitous service provisioning. In COMPSAC, 444-451. IEEE Computer Society.
-
(2004)
COMPSAC
, pp. 444-451
-
-
Corradi, A.1
Montanari, R.2
Tibaldi, D.3
-
3
-
-
84900830868
-
Understanding and using context
-
Dey, A. K. 2001. Understanding and using context. Personal Ubiquitous Comput. 5(1):4-7.
-
(2001)
Personal Ubiquitous Comput.
, vol.5
, Issue.1
, pp. 4-7
-
-
Dey, A.K.1
-
4
-
-
33645311516
-
Reality mining: Sensing complex social systems
-
Eagle, N., and Pentland, A. S. 2006. Reality mining: sensing complex social systems. Personal Ubiquitous Comput. 10:255-268.
-
(2006)
Personal Ubiquitous Comput.
, vol.10
, pp. 255-268
-
-
Eagle, N.1
Pentland, A.S.2
-
6
-
-
67650293214
-
Understanding and capturing people's privacy policies in a mobile social networking application
-
Sadeh, N.; Hong, J.; Cranor, L.; Fette, I.; Kelley, P.; Prabaker, M.; and Rao, J. 2009. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13(6):401-412.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 401-412
-
-
Sadeh, N.1
Hong, J.2
Cranor, L.3
Fette, I.4
Kelley, P.5
Prabaker, M.6
Rao, J.7
-
7
-
-
80054880571
-
Saveface: Save george's faces in social networks where contexts collapse
-
Shih, F., and Paradesi, S. 2010. Saveface: Save george's faces in social networks where contexts collapse. In IAB/W3C Internet Privacy Workshop.
-
(2010)
IAB/W3C Internet Privacy Workshop
-
-
Shih, F.1
Paradesi, S.2
-
8
-
-
33845427407
-
A semantic context-aware access control framework for secure collaborations in pervasive computing environments
-
Cruz, I. F.; Decker, S.; Allemang, D.; Preist, C.; Schwabe, D.; Mika, P.; Uschold, M.; and Aroyo, L., eds., International Semantic Web Conference, Springer
-
Toninelli, A.; Montanari, R.; Kagal, L.; and Lassila, O. 2006. A semantic context-aware access control framework for secure collaborations in pervasive computing environments. In Cruz, I. F.; Decker, S.; Allemang, D.; Preist, C.; Schwabe, D.; Mika, P.; Uschold, M.; and Aroyo, L., eds., International Semantic Web Conference, volume 4273 of Lecture Notes in Computer Science, 473-486. Springer.
-
(2006)
Lecture Notes in Computer Science
, vol.4273
, pp. 473-486
-
-
Toninelli, A.1
Montanari, R.2
Kagal, L.3
Lassila, O.4
-
9
-
-
33750037698
-
-
Technical report, Massachusetts Institute of Technology Computer Science and Arti-cial Intelligence Laboratory
-
Weitzner, D. J.; Abelson, H.; Berners-Lee, T.; Hanson, C.; Hendler, J.; Kagal, L.; McGuinness, D. L.; Sussman, G. J.; and Waterman, K. K. 2006. Transparent accountable data mining: New strategies forprivacy protection. Technical report, Massachusetts Institute of Technology Computer Science and Arti-cial Intelligence Laboratory.
-
(2006)
Transparent Accountable Data Mining: New Strategies Forprivacy Protection
-
-
Weitzner, D.J.1
Abelson, H.2
Berners-Lee, T.3
Hanson, C.4
Hendler, J.5
Kagal, L.6
McGuinness, D.L.7
Sussman, G.J.8
Waterman, K.K.9
|