-
1
-
-
33845427407
-
A semantic context-aware access control framework for secure collaborations in pervasive computing environments
-
Toninelli, A., et al.: A semantic context-aware access control framework for secure collaborations in pervasive computing environments. In: ISWC, pp. 473-486 (2006)
-
(2006)
ISWC
, pp. 473-486
-
-
Toninelli, A.1
-
2
-
-
84900830868
-
Understanding and using context
-
Dey, A.K.: Understanding and using context. Personal and Ubiquitous Computing 5(1), 4-7 (2001)
-
(2001)
Personal and Ubiquitous Computing
, vol.5
, Issue.1
, pp. 4-7
-
-
Dey, A.K.1
-
3
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., et al.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
-
5
-
-
33750107060
-
Supporting context-aware mobile applications: An infrastructure approach
-
van Sinderen, M., et al.: Supporting context-aware mobile applications: an infrastructure approach. Communications Magazine 44(9), 96-104 (2006)
-
(2006)
Communications Magazine
, vol.44
, Issue.9
, pp. 96-104
-
-
Van Sinderen, M.1
-
6
-
-
33749528034
-
Contextualizing applications via semantic middleware
-
IEEE Computer Society, Washington
-
Lassila, O., Khushraj, D.: Contextualizing applications via semantic middleware. In: MOBIQUITOUS 2005, pp. 183-191. IEEE Computer Society, Washington (2005)
-
(2005)
MOBIQUITOUS 2005
, pp. 183-191
-
-
Lassila, O.1
Khushraj, D.2
-
7
-
-
34247187395
-
A quality measurement method of context information in ubiquitous environments
-
November
-
Kim, Y., Lee, K.: A quality measurement method of context information in ubiquitous environments. In: ICHIT 2006, vol. 2, pp. 576-581 (November 2006)
-
(2006)
ICHIT 2006
, vol.2
, pp. 576-581
-
-
Kim, Y.1
Lee, K.2
-
8
-
-
33845920353
-
Contory: A middleware for the provisioning of context information on smart phones
-
Riva, O.: Contory: A middleware for the provisioning of context information on smart phones. In: Middleware, pp. 219-239 (2006)
-
(2006)
Middleware
, pp. 219-239
-
-
Riva, O.1
-
9
-
-
0035791053
-
Securing context-aware applications using environment roles
-
ACM, New York
-
Covington, M.J., et al.: Securing context-aware applications using environment roles. In: SACMAT 2001, pp. 10-20. ACM, New York (2001)
-
(2001)
SACMAT 2001
, pp. 10-20
-
-
Covington, M.J.1
-
10
-
-
33847011964
-
Cerberus: A context-aware security scheme for smart spaces
-
March
-
Al-Muhtadi, J., et al.: Cerberus: a context-aware security scheme for smart spaces. In: PerCom 2003, pp. 489-496 (March 2003)
-
(2003)
PerCom 2003
, pp. 489-496
-
-
Al-Muhtadi, J.1
-
11
-
-
56849104472
-
Utilizing semantic knowledge for access control in pervasive and ubiquitous systems
-
October
-
Dersingh, A., Liscano, R., Jost, A.: Utilizing semantic knowledge for access control in pervasive and ubiquitous systems. In:WIMOB 2008, pp. 435-441 (October 2008)
-
(2008)
WIMOB 2008
, pp. 435-441
-
-
Dersingh, A.1
Liscano, R.2
Jost, A.3
-
12
-
-
84885891584
-
Context-aware access control; making access control decisions based on context information
-
July
-
Lachmund, S., et al.: Context-aware access control; making access control decisions based on context information. In: Mobiquitous 2006, pp. 1-8 (July 2006)
-
(2006)
Mobiquitous 2006
, pp. 1-8
-
-
Lachmund, S.1
-
13
-
-
47849114093
-
A context quality model for ubiquitous applications
-
September
-
Tang, S., Yang, J., Wu, Z.: A context quality model for ubiquitous applications. In: IFIP NPC Workshops, pp. 282-287 (September 2007)
-
(2007)
IFIP NPC Workshops
, pp. 282-287
-
-
Tang, S.1
Yang, J.2
Wu, Z.3
-
14
-
-
34250714819
-
Managing quality of context in pervasive computing
-
October
-
Bu, Y., et al.: Managing quality of context in pervasive computing. In: QSIC 2006, pp. 193-200 (October 2006)
-
(2006)
QSIC 2006
, pp. 193-200
-
-
Bu, Y.1
|