메뉴 건너뛰기




Volumn , Issue , 2011, Pages 312-319

A context-aware recommendation system to behavioral based authentication in mobile and pervasive environments

Author keywords

Context aware recommendation systems; Implicit authentication; Pervasive computing

Indexed keywords

CONTEXT-AWARE; CUSTOMIZABLE; DYNAMIC ENVIRONMENTS; OPERATIONAL CHARACTERISTICS; PERVASIVE ENVIRONMENTS; PERVASIVE SPACE; PROACTIVITY; SIMILARITY MODELS; SPATIO-TEMPORAL; USER BEHAVIORS;

EID: 84855794186     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EUC.2011.2     Document Type: Conference Paper
Times cited : (14)

References (17)
  • 2
    • 85037074313 scopus 로고    scopus 로고
    • Implicit authentication through learning user behavior
    • E. Shi, Y. Niu, M. Jakobsson, and R. Chow, "Implicit authentication through learning user behavior," Information Security, pp. 99-113, 2011.
    • (2011) Information Security , pp. 99-113
    • Shi, E.1    Niu, Y.2    Jakobsson, M.3    Chow, R.4
  • 3
    • 54949140060 scopus 로고    scopus 로고
    • A dynamic authentication scheme for mobile transactions
    • [Online]
    • B. Sathish Babu and P. Venkataram, "A dynamic authentication scheme for mobile transactions," International Journal, vol. 8, no. 1, pp. 59-74, 2009. [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10. 1.1.155.4468\&rep=rep1\&type=pdf
    • (2009) International Journal , vol.8 , Issue.1 , pp. 59-74
    • Sathish Babu, B.1    Venkataram, P.2
  • 4
    • 63049139246 scopus 로고    scopus 로고
    • Activity-based security scheme for ubiquitous environments
    • [Online]
    • J. Hassan, A. Riaz, and S. Raazi, "Activity-based Security Scheme for Ubiquitous Environments," IPCCC 2008., pp. 475-481, 2008. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs\all.jsp?arnumber=4745102
    • (2008) IPCCC 2008 , pp. 475-481
    • Hassan, J.1    Riaz, A.2    Raazi, S.3
  • 5
    • 77950846494 scopus 로고    scopus 로고
    • Human identification through image evaluation using secret predicates
    • [Online]
    • H. Jameel, R. Shaikh, H. Lee, and S. Lee, "Human identification through image evaluation using secret predicates," Topics in Cryptology-CT-RSA 2007, vol. 4377, pp. 67-84, 2006. [Online]. Available: http://www.springerlink.com/index/EVL6JGT546674294.pdf
    • (2006) Topics in Cryptology-CT-RSA 2007 , vol.4377 , pp. 67-84
    • Jameel, H.1    Shaikh, R.2    Lee, H.3    Lee, S.4
  • 6
    • 18844418489 scopus 로고    scopus 로고
    • Context-based access control management in ubiquitous environments
    • [Online]
    • A. Corradi, R. Montanari, and D. Tibaldi, "Context-based access control management in ubiquitous environments," Network Computing and Applications, IEEE International Symposium on, vol. 0, pp. 253-260, 2004. [Online]. Available: http://www.computer.org/portal/web/csdl/doi/10.1109/NCA. 2004.1347784
    • (2004) Network Computing and Applications, IEEE International Symposium on , vol.0 , pp. 253-260
    • Corradi, A.1    Montanari, R.2    Tibaldi, D.3
  • 7
    • 1842688881 scopus 로고    scopus 로고
    • Context-aware middleware for resource management in the wireless Internet
    • [Online]
    • P. Bellavista, A. Corradi, R. Montanari, and C. Stefanelli, "Context-aware middleware for resource management in the wireless Internet," IEEE Transactions on Software Engineering, vol. 29, pp. 1086-1099, 2003. [Online]. Available: http://www.computer.org/portal/web/csdl/ doi/10.1109/TSE.2003.1265523
    • (2003) IEEE Transactions on Software Engineering , vol.29 , pp. 1086-1099
    • Bellavista, P.1    Corradi, A.2    Montanari, R.3    Stefanelli, C.4
  • 8
    • 70349773629 scopus 로고    scopus 로고
    • Human-battery interaction on mobile phones
    • A. Rahmati and L. Zhong, "Human-battery interaction on mobile phones," Pervasive and Mobile Computing, vol. 5, no. 5, pp. 465-477, 2009.
    • (2009) Pervasive and Mobile Computing , vol.5 , Issue.5 , pp. 465-477
    • Rahmati, A.1    Zhong, L.2
  • 10
    • 35348911373 scopus 로고    scopus 로고
    • Guest editors' introduction: Security & privacy
    • J. Hong, M. Satyanarayanan, and G. Cybenko, "Guest Editors' Introduction: Security & Privacy," IEEE Pervasive Computing, vol. 6, no. 4, pp. 15-17, 2007.
    • (2007) IEEE Pervasive Computing , vol.6 , Issue.4 , pp. 15-17
    • Hong, J.1    Satyanarayanan, M.2    Cybenko, G.3
  • 11
    • 84900830868 scopus 로고    scopus 로고
    • Understanding and using context
    • [Online]
    • A. Dey, "Understanding and using context," Personal and ubiquitous computing, vol. 5, no. 1, pp. 4-7, 2001. [Online]. Available: http://portal.acm.org/citation.cfm?id=593572
    • (2001) Personal and Ubiquitous Computing , vol.5 , Issue.1 , pp. 4-7
    • Dey, A.1
  • 12
    • 33746050930 scopus 로고    scopus 로고
    • Using activity theory to model context awareness: A qualitative case study
    • Florida, USA, AAAI Press, [Online]
    • J. Cassens and A. Kofod-Petersen, "Using activity theory to model context awareness: a qualitative case study," in Proceedings of the 19th International Florida Artificial Intelligence Research Society Conference, Florida, USA, AAAI Press, 2006, pp. 619-624. [Online]. Available: http://scholar.google.com/scholar?hl=en\&btnG=Search\&q=intitle: Using+Activity+Theory+to+Model+Context+Awareness+:+a+Qualitative+Case+Study\#0
    • (2006) Proceedings of the 19th International Florida Artificial Intelligence Research Society Conference , pp. 619-624
    • Cassens, J.1    Kofod-Petersen, A.2
  • 14
    • 84855791078 scopus 로고    scopus 로고
    • A recommendation system considering users' past/current/future contexts
    • [Online]
    • K. Oku, S. Nakajima, J. Miyazaki, S. Uemura, H. Kato, and F. Hattori, "A Recommendation System Considering Users' Past/Current/Future Contexts," ids.csom.umn.edu, pp. 3-7, 2010. [Online]. Available: http://ids.csom.umn.edu/faculty/gedas/cars2010/OkuEtAl-CARS-2010.pdf
    • (2010) Ids.csom.umn.edu , pp. 3-7
    • Oku, K.1    Nakajima, S.2    Miyazaki, J.3    Uemura, S.4    Kato, H.5    Hattori, F.6
  • 16
    • 77949459582 scopus 로고    scopus 로고
    • SaTScan: Software for the spatial, temporal, and space-time scan statistics, version 5.1 [computer program]
    • [Online]
    • M. Kulldorff, "SaTScan: software for the spatial, temporal, and space-time scan statistics, version 5.1 [computer program]," Inf Manag Serv, 2005. [Online]. Available: http://scholar.google.com/scholar?hl=en\ &btnG=Search\&q=intitle:SaTScan:+Software+for+the+Spatial,+Temporal, +and+Space-Time+Scan+Statistics\#0
    • (2005) Inf Manag Serv
    • Kulldorff, M.1
  • 17
    • 77957850477 scopus 로고    scopus 로고
    • An authentication approach based on behavioral profiles
    • Santiago de Compostela, Spain: IEEE, Jun. [Online]
    • J. Lima, C. Rocha, and M. Dantas, "An authentication approach based on behavioral profiles," in Information Systems and Technologies (CISTI), 2010 5th Iberian Conference on. Santiago de Compostela, Spain: IEEE, Jun. 2010, pp. 1-4. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs\-all.jsp? arnumber=5556601
    • (2010) Information Systems and Technologies (CISTI), 2010 5th Iberian Conference on , pp. 1-4
    • Lima, J.1    Rocha, C.2    Dantas, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.