-
7
-
-
85015437589
-
LRBAC: A location-aware role-based access control model.
-
Springer Berlin Heidelberg
-
I. Ray, M. Kumar, and L. Yu LRBAC: a location-aware role-based access control model. Information Systems Security 2006 Springer Berlin Heidelberg 147 161
-
(2006)
Information Systems Security
, pp. 147-161
-
-
Ray, I.1
Kumar, M.2
Yu, L.3
-
11
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
New York, USA
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters Attribute-based encryption for fine-grained access control of encrypted data Proceedings of the 13th ACM Conference on Computer and Communication Security 2006 New York, USA 89 98
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communication Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
13
-
-
84880914747
-
Low complexity multi-authority attribute based encryption scheme for mobile cloud computing
-
San Francisco, USA
-
F. Li, Y. Rahulamathavan, M. Rajarajan, and R.C.-W. Phan Low complexity multi-authority attribute based encryption scheme for mobile cloud computing Proceedings of the IEEE 7th International Symposium on Service Oriented System Engineering (SOSE) 2013 San Francisco, USA 573 577
-
(2013)
Proceedings of the IEEE 7th International Symposium on Service Oriented System Engineering (SOSE)
, pp. 573-577
-
-
Li, F.1
Rahulamathavan, Y.2
Rajarajan, M.3
Phan, R.C.-W.4
-
14
-
-
84941879344
-
-
Cisco Study: IT Saying Yes to BYOD, Cisco, May 2012 (accessed on 15 July 2015)
-
Cisco Study: IT Saying Yes to BYOD, Cisco, http://tinyurl.com/d8fv2uj, May 2012 (accessed on 15 July 2015).
-
-
-
-
15
-
-
84867375385
-
BYOD: Security and privacy considerations
-
K.W. Miller, J. Voas, and G.F. Hurlburt BYOD: security and privacy considerations IT Prof. 14 5 2012 53 55
-
(2012)
IT Prof.
, vol.14
, Issue.5
, pp. 53-55
-
-
Miller, K.W.1
Voas, J.2
Hurlburt, G.F.3
-
16
-
-
84857696369
-
BYOD: Enabling the chaos
-
G. Thomson BYOD: Enabling the chaos Net. Secur. 2012 2 2012 5 8
-
(2012)
Net. Secur.
, vol.2012
, Issue.2
, pp. 5-8
-
-
Thomson, G.1
-
17
-
-
77958148654
-
Spatial-temporal access control for e-health services
-
A. Boonyarattaphan, Y. Bai, S. Chung, and R. Poovendran Spatial-temporal access control for e-health services Proceedings of the 5th IEEE International Conference on Networking, Architecture and Storage (NAS) 2010 269 276
-
(2010)
Proceedings of the 5th IEEE International Conference on Networking, Architecture and Storage (NAS)
, pp. 269-276
-
-
Boonyarattaphan, A.1
Bai, Y.2
Chung, S.3
Poovendran, R.4
-
19
-
-
41549105875
-
A new data encryption algorithm based on the location of mobile users
-
L. Hsien-Chou, and C. Yun-Hsiang A new data encryption algorithm based on the location of mobile users Inf. Technol. J. 7 1 2008 63 69
-
(2008)
Inf. Technol. J.
, vol.7
, Issue.1
, pp. 63-69
-
-
Hsien-Chou, L.1
Yun-Hsiang, C.2
-
21
-
-
77950340694
-
Secure localization using elliptic curve cryptography in wireless sensor networks
-
V. Vijayalakshmi, and T.G. Palanivelu Secure localization using elliptic curve cryptography in wireless sensor networks Int. J. Comp. Sci. Netw. Secur. 8 6 2008 255 261
-
(2008)
Int. J. Comp. Sci. Netw. Secur.
, vol.8
, Issue.6
, pp. 255-261
-
-
Vijayalakshmi, V.1
Palanivelu, T.G.2
-
25
-
-
33751084887
-
Host-based intrusion detection for advanced mobile devices
-
Washington, DC, USA
-
M. Miettinen, P. Halonen, and K. Hatonen Host-based intrusion detection for advanced mobile devices Proceedings of the 20th International Conference Advanced Information Networking and Applications 2006 Washington, DC, USA 72 76
-
(2006)
Proceedings of the 20th International Conference Advanced Information Networking and Applications
, pp. 72-76
-
-
Miettinen, M.1
Halonen, P.2
Hatonen, K.3
-
27
-
-
33645311516
-
Reality mining: Sensing complex social systems
-
N. Eagle, and A.S. Pentland Reality mining: sensing complex social systems J. Pers. Ubiquitous Comput. 10 4 2006 255 268
-
(2006)
J. Pers. Ubiquitous Comput.
, vol.10
, Issue.4
, pp. 255-268
-
-
Eagle, N.1
Pentland, A.S.2
-
29
-
-
84941881166
-
-
Samsung KNOX, (accessed on 15 July 2015)
-
Samsung KNOX, http://tinyurl.com/me93jcv (accessed on 15 July 2015).
-
-
-
-
30
-
-
84941874750
-
-
BlackBerry BES12, (accessed on 15 July 2015)
-
BlackBerry BES12, http://tinyurl.com/ls3yxh8 (accessed on 15 July 2015).
-
-
-
-
33
-
-
79957993008
-
Decentralizing attribute-based encryption
-
Springer
-
A.B. Lewko, and B. Waters Decentralizing attribute-based encryption EUROCRYPT, Ser. LNCS vol. 6632 2011 Springer 568 588
-
(2011)
EUROCRYPT, Ser. LNCS
, vol.6632
, pp. 568-588
-
-
Lewko, A.B.1
Waters, B.2
-
34
-
-
84884648634
-
TRUMP: A trusted mobile platform for self-management of chronic illness in rural areas
-
Springer Berlin Heidelberg
-
C. Burnett, P. Edwards, T.J. Norman, L. Chen, Y. Rahulamathavan, M. Jaffray, and E. Pignotti TRUMP: a trusted mobile platform for self-management of chronic illness in rural areas Trust and Trustworthy Computing 2013 Springer Berlin Heidelberg 142 150
-
(2013)
Trust and Trustworthy Computing
, pp. 142-150
-
-
Burnett, C.1
Edwards, P.2
Norman, T.J.3
Chen, L.4
Rahulamathavan, Y.5
Jaffray, M.6
Pignotti, E.7
-
36
-
-
84941876608
-
-
The Java Pairing-Based Cryptography Library (JPBC), (accessed on 15 July 2015)
-
The Java Pairing-Based Cryptography Library (JPBC), http://tinyurl.com/ll2p39t (accessed on 15 July 2015).
-
-
-
-
39
-
-
84870151992
-
CRePE: Context-related policy enforcement for android
-
Boca Raton, FL, USA
-
M. Conti, V.T.N. Nguyen, and B. Crispo CRePE: context-related policy enforcement for android Proceedings of the 13th Information Security Conference 2010 Boca Raton, FL, USA 331 354
-
(2010)
Proceedings of the 13th Information Security Conference
, pp. 331-354
-
-
Conti, M.1
Nguyen, V.T.N.2
Crispo, B.3
-
40
-
-
84869469227
-
DEMO: Demonstrating the effectiveness of MOSESdroid for separation of execution modes
-
Raleigh, NC, USA
-
G. Russello, M. Conti, B. Crispo, E. Fernandes, and Y. Zhauniarovich DEMO: demonstrating the effectiveness of MOSESdroid for separation of execution modes Proceedings of the 19th ACM Conference Computer Communication Security 2012 Raleigh, NC, USA 998 1000
-
(2012)
Proceedings of the 19th ACM Conference Computer Communication Security
, pp. 998-1000
-
-
Russello, G.1
Conti, M.2
Crispo, B.3
Fernandes, E.4
Zhauniarovich, Y.5
-
41
-
-
84864062248
-
MOSES: Supporting operation modes on smartphones
-
Newark, NJ, US
-
G. Russello, M. Conti, B. Crispo, and E. Fernandes MOSES: supporting operation modes on smartphones Proceedings of the 17th ACM Symposium Access Control Models and Technologies 2012 Newark, NJ, US 3 12
-
(2012)
Proceedings of the 17th ACM Symposium Access Control Models and Technologies
, pp. 3-12
-
-
Russello, G.1
Conti, M.2
Crispo, B.3
Fernandes, E.4
-
42
-
-
84903980304
-
MOSES: Supporting and enforcing security profiles on smartphones
-
Y. Zhauniarovich, G. Russello, M. Conti, B. Crispo, E. Fernandes MOSES: supporting and enforcing security profiles on smartphones IEEE Trans. Dependable Secure Comput 11 3 2014 211 222
-
(2014)
IEEE Trans. Dependable Secure Comput
, vol.11
, Issue.3
, pp. 211-222
-
-
Zhauniarovich, Y.1
Russello, G.2
Conti, M.3
Crispo, B.4
Fernandes, E.5
|