-
1
-
-
84861546683
-
Passwords are not enough
-
May
-
T. Matthews, "Passwords are not enough," Elsevier Computer Fraud & Security, Volume 2012, Issue 5, May 2012, pp. 18-20.
-
(2012)
Elsevier Computer Fraud & Security
, vol.2012
, Issue.5
, pp. 18-20
-
-
Matthews, T.1
-
2
-
-
84879321830
-
Usable authentication for electronic healthcare systems
-
(Accessed: 26 September
-
Q. Wang, H. Jin, "Usable authentication for electronic healthcare systems," Symposium on Usable Privacy and Security (SOUPS), 2008. http://cups.cs.cmu.edu/soups/2008/posters/wang.pdf (Accessed: 26 September, 2012)
-
(2012)
Symposium on Usable Privacy and Security (SOUPS), 2008.
-
-
Wang, Q.1
Jin, H.2
-
3
-
-
85008049424
-
T-Engine: Japan's ubiquitous computing architecture is ready for prime time
-
April
-
J. Krikke, "T-Engine: Japan's ubiquitous computing architecture is ready for prime time," IEEE Pervasive Computing, Vol. 4, No. 2, April 2005, pp. 4-9.
-
(2005)
IEEE Pervasive Computing
, vol.4
, Issue.2
, pp. 4-9
-
-
Krikke, J.1
-
4
-
-
0035517884
-
The eTRON wide-area distributed-system architecture for e-commerce
-
K. Sakamura and N. Koshizuka, "The eTRON wide-area distributed-system architecture for e-commerce," IEEE Micro, Vol. 21, No. 6, 2001, pp. 7-12.
-
(2001)
IEEE Micro
, vol.21
, Issue.6
, pp. 7-12
-
-
Sakamura, K.1
Koshizuka, N.2
-
5
-
-
79952825949
-
ETNet: A smart card network architecture for flexible electronic commerce services
-
T. Yashiro, M. F. F. Khan, S. Ito, M. Bessho, S. Kobayashi, T. Usaka, N. Koshizuka and K. Sakamura, "eTNet: A smart card network architecture for flexible electronic commerce services," 4th IFIP International Conference on New Technologies, Mobility and Security, 2011, pp. 1-5.
-
(2011)
4th IFIP International Conference on New Technologies, Mobility and Security
, pp. 1-5
-
-
Yashiro, T.1
Khan, M.F.F.2
Ito, S.3
Bessho, M.4
Kobayashi, S.5
Usaka, T.6
Koshizuka, N.7
Sakamura, K.8
-
6
-
-
84948983013
-
Access control for active spaces
-
G. Sampemane, P. Naldurg, and R. H. Campbell, "Access control for active spaces," Annual Computer Security Applications Conference, 2002, pp. 343-352.
-
(2002)
Annual Computer Security Applications Conference
, pp. 343-352
-
-
Sampemane, G.1
Naldurg, P.2
Campbell, R.H.3
-
7
-
-
0035791053
-
Securing context-aware applications using environment roles
-
M. J. Covington, W. Long, S. Srinivasan, A. K. Dey, M. Ahamad, and G. D. Abowd, "Securing context-aware applications using environment roles," ACM Symposium on Access Control Models and Technologies, 2001, pp. 10-20.
-
(2001)
ACM Symposium on Access Control Models and Technologies
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
8
-
-
30644474741
-
GEORBAC: A spatially aware RBAC
-
E. Bertino, B. Catania, M. L. Damiani, and P. Perlasca, "GEORBAC: A spatially aware RBAC," ACM Symposium on Access control Models and Technologies, 2005, pp. 29-37.
-
(2005)
ACM Symposium on Access Control Models and Technologies
, pp. 29-37
-
-
Bertino, E.1
Catania, B.2
Damiani, M.L.3
Perlasca, P.4
-
9
-
-
17444406680
-
A generalized temporal role-based access control model
-
J. B. D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, "A generalized temporal role-based access control model," IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 1, 2005, pp. 4-23.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
10
-
-
0242709331
-
A context-related authorization and access control method based on RBAC: A case study from the health care domain
-
M. Wilikens, S. Feriti, and M. Masera, "A context-related authorization and access control method based on RBAC: A case study from the health care domain," ACM Symposium on Access control Models and Technologies, 2002, pp. 117-124.
-
(2002)
ACM Symposium on Access Control Models and Technologies
, pp. 117-124
-
-
Wilikens, M.1
Feriti, S.2
Masera, M.3
-
11
-
-
38649120843
-
A context, rule and RBAC access control in enterprise pervasive computing environment
-
H. Xianxi, W. Haiyang, C. Zhenxiang, and L. Jinjiou, "A context, rule and RBAC access control in enterprise pervasive computing environment," International Symposium on Pervasive Computing and Applications, 2006, pp. 497-502.
-
(2006)
International Symposium on Pervasive Computing and Applications
, pp. 497-502
-
-
Xianxi, H.1
Haiyang, W.2
Zhenxiang, C.3
Jinjiou, L.4
-
12
-
-
0031387996
-
Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
R. K. Thomas, "Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments," ACM workshop on Role-based access control, 1997, pp. 13.19.
-
(1997)
ACM Workshop on Role-based Access Control
, pp. 13-19
-
-
Thomas, R.K.1
-
13
-
-
0035790754
-
Flexible team-based access control using contexts
-
C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas, "Flexible team-based access control using contexts," ACM Symposium on Access Control Models and Technologies, 2001, pp. 21-27.
-
(2001)
ACM Symposium on Access Control Models and Technologies
, pp. 21-27
-
-
Georgiadis, C.K.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.K.4
-
14
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, "Role-based access control models," IEEE Computer, Vol. 29, No. 2, 1996, pp. 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
15
-
-
77952374462
-
-
Technical Report HPL-2009-30, HP Labs
-
A.H. Karp, H. Haury, and M.H. Davis, "From ABAC to ZBAC: The evolution of access control models," Technical Report HPL-2009-30, HP Labs, 2009.
-
(2009)
From ABAC to ZBAC: The Evolution of Access Control Models
-
-
Karp, A.H.1
Haury, H.2
Davis, M.H.3
-
16
-
-
84879288693
-
-
HL7, (Accessed: 26 September, 2012)
-
HL7, http://www.hl7.org/(Accessed: 26 September, 2012)
-
-
-
-
17
-
-
84879318970
-
-
HIPAA, (Accessed: 26 September, 2012)
-
HIPAA, www.hhs.gov/ocr/privacy/index.html (Accessed: 26 September, 2012)
-
-
-
-
18
-
-
84879323797
-
-
Canada Health Infoway, (Accessed: 26 September, 2012)
-
Canada Health Infoway, http://www.infoway-inforoute.ca/langen/(Accessed: 26 September, 2012)
-
-
-
-
19
-
-
77953350247
-
Adding attributes to role-based access control
-
June
-
D. R. Kuhn, E. J. Coyne, and T. R. Weil, "Adding Attributes to Role-Based Access Control," IEEE Computer, 43(6), June 2010, pp. 79-81.
-
(2010)
IEEE Computer
, vol.43
, Issue.6
, pp. 79-81
-
-
Kuhn, D.R.1
Coyne, E.J.2
Weil, T.R.3
|