메뉴 건너뛰기




Volumn 7 LNICST, Issue , 2009, Pages 236-251

A quality of context-aware approach to access control in pervasive environments

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL DECISIONS; ACCESS DECISION; CONTEXT INFORMATION; CONTEXT-AWARE; CONTEXT-AWARE ACCESS CONTROL; CONTEXT-AWARENESS; CONTEXT-BASED; CONTROL ACCESS; DESIGN GUIDELINES; DYNAMIC ADAPTATIONS; HIGH LEVEL DESCRIPTION; NETWORK TOPOLOGY; NOVEL SOLUTIONS; OPERATING CONDITION; PERVASIVE ENVIRONMENTS; POLICY FRAMEWORK; PORTABLE DEVICE; RESEARCH EFFORTS; RESOURCE SHARING; SECURITY BREACHES; SEMANTIC TECHNOLOGIES; CONTEXT-BASED ACCESS CONTROLS; DIFFERENT OPERATING CONDITIONS; MOBILITY AND HETEROGENEITIES;

EID: 84883615649     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-01802-2_18     Document Type: Conference Paper
Times cited : (13)

References (14)
  • 1
    • 33845427407 scopus 로고    scopus 로고
    • A semantic context-aware access control framework for secure collaborations in pervasive computing environments
    • Toninelli, A., et al.: A semantic context-aware access control framework for secure collaborations in pervasive computing environments. In: ISWC, pp. 473-486 (2006)
    • (2006) ISWC , pp. 473-486
    • Toninelli, A.1
  • 2
    • 84900830868 scopus 로고    scopus 로고
    • Understanding and using context
    • Dey, A.K.: Understanding and using context. Personal and Ubiquitous Computing 5(1), 4-7 (2001)
    • (2001) Personal and Ubiquitous Computing , vol.5 , Issue.1 , pp. 4-7
    • Dey, A.K.1
  • 3
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Sandhu, R.S., et al.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1
  • 4
    • 62949158440 scopus 로고    scopus 로고
    • Quality of context: What it is and why we need it
    • Buchholz, T., Kupper, A., Schiffer, M.: Quality of context: What it is and why we need it. In: HPOVUA 2003 (2003)
    • (2003) HPOVUA 2003
    • Buchholz, T.1    Kupper, A.2    Schiffer, M.3
  • 5
    • 33750107060 scopus 로고    scopus 로고
    • Supporting context-aware mobile applications: An infrastructure approach
    • van Sinderen, M., et al.: Supporting context-aware mobile applications: an infrastructure approach. Communications Magazine 44(9), 96-104 (2006)
    • (2006) Communications Magazine , vol.44 , Issue.9 , pp. 96-104
    • Van Sinderen, M.1
  • 6
    • 33749528034 scopus 로고    scopus 로고
    • Contextualizing applications via semantic middleware
    • IEEE Computer Society, Washington
    • Lassila, O., Khushraj, D.: Contextualizing applications via semantic middleware. In: MOBIQUITOUS 2005, pp. 183-191. IEEE Computer Society, Washington (2005)
    • (2005) MOBIQUITOUS 2005 , pp. 183-191
    • Lassila, O.1    Khushraj, D.2
  • 7
    • 34247187395 scopus 로고    scopus 로고
    • A quality measurement method of context information in ubiquitous environments
    • November
    • Kim, Y., Lee, K.: A quality measurement method of context information in ubiquitous environments. In: ICHIT 2006, vol. 2, pp. 576-581 (November 2006)
    • (2006) ICHIT 2006 , vol.2 , pp. 576-581
    • Kim, Y.1    Lee, K.2
  • 8
    • 33845920353 scopus 로고    scopus 로고
    • Contory: A middleware for the provisioning of context information on smart phones
    • Riva, O.: Contory: A middleware for the provisioning of context information on smart phones. In: Middleware, pp. 219-239 (2006)
    • (2006) Middleware , pp. 219-239
    • Riva, O.1
  • 9
    • 0035791053 scopus 로고    scopus 로고
    • Securing context-aware applications using environment roles
    • ACM, New York
    • Covington, M.J., et al.: Securing context-aware applications using environment roles. In: SACMAT 2001, pp. 10-20. ACM, New York (2001)
    • (2001) SACMAT 2001 , pp. 10-20
    • Covington, M.J.1
  • 10
    • 33847011964 scopus 로고    scopus 로고
    • Cerberus: A context-aware security scheme for smart spaces
    • March
    • Al-Muhtadi, J., et al.: Cerberus: a context-aware security scheme for smart spaces. In: PerCom 2003, pp. 489-496 (March 2003)
    • (2003) PerCom 2003 , pp. 489-496
    • Al-Muhtadi, J.1
  • 11
    • 56849104472 scopus 로고    scopus 로고
    • Utilizing semantic knowledge for access control in pervasive and ubiquitous systems
    • October
    • Dersingh, A., Liscano, R., Jost, A.: Utilizing semantic knowledge for access control in pervasive and ubiquitous systems. In:WIMOB 2008, pp. 435-441 (October 2008)
    • (2008) WIMOB 2008 , pp. 435-441
    • Dersingh, A.1    Liscano, R.2    Jost, A.3
  • 12
    • 84885891584 scopus 로고    scopus 로고
    • Context-aware access control; making access control decisions based on context information
    • July
    • Lachmund, S., et al.: Context-aware access control; making access control decisions based on context information. In: Mobiquitous 2006, pp. 1-8 (July 2006)
    • (2006) Mobiquitous 2006 , pp. 1-8
    • Lachmund, S.1
  • 13
    • 47849114093 scopus 로고    scopus 로고
    • A context quality model for ubiquitous applications
    • September
    • Tang, S., Yang, J., Wu, Z.: A context quality model for ubiquitous applications. In: IFIP NPC Workshops, pp. 282-287 (September 2007)
    • (2007) IFIP NPC Workshops , pp. 282-287
    • Tang, S.1    Yang, J.2    Wu, Z.3
  • 14
    • 34250714819 scopus 로고    scopus 로고
    • Managing quality of context in pervasive computing
    • October
    • Bu, Y., et al.: Managing quality of context in pervasive computing. In: QSIC 2006, pp. 193-200 (October 2006)
    • (2006) QSIC 2006 , pp. 193-200
    • Bu, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.