상황인지 커뮤니티 컴퓨팅 환경에서의 접근제어 정책과 개인 정보 보호

  • Published : 2009.03.25

Abstract

Keywords

References

  1. 커뮤니티 컴퓨팅-위키백과, http://ko. wikipedia.org/wiki/커뮤니티-컴퓨팅
  2. L. Pareschi, D. Riboni, A. Agostini and C. Bettini, 'Composition and Generalization of Context Data for Privacy Preservation', In Proc. of 6th IEEE International Conference on Pervasive Computing and Communications (PerCom), Mar, 2008, Hong Kong https://doi.org/10.1109/PERCOM.2008.47
  3. S. Jajodia, R. and S. Sandhu, 'Toward a multilevel secure relational data model', In ACM SIGMOD Record, Vol. 20, No.2, pp. 50-59, Jun., 1991 https://doi.org/10.1145/119995.115796
  4. E. Bertino and E. Ferrari, 'Secure and selective dissemination of XML documents', In Transactions on Information and System Security (TISSEC), Vol. 5 No.3, Aug., 2002 https://doi.org/10.1145/545186.545190
  5. P. Reddivari et al., 'Policy based Access Control for a RDF Store', In Proc. of the Policy Management for the Web Workshop, May, 2005
  6. A. Jain and C. Farkas, 'Secure resource description framework: an access control model', In Proc. of ACM symposium on Access control models and technologies(SACMAT '06), pp 121-129, 2006, Lake Tahoe, California, USA https://doi.org/10.1145/1133058.1133076
  7. http://www. w3.org/TR/rdf-mt/#RDFSRules
  8. L. Qin and V. Atluri, "Concept-level access control for the Semantic Web", In Proc. of ACM workshop on XMLsecurity (XMLSEC '03), 2003 https://doi.org/10.1145/968559.968575
  9. U. Hengartner and P. Steenkiste, 'Access Control to Information in Pervasive Computing Environments', In Proc. of HotOS, 2003
  10. L. Kagal, T. Finin and A. Joshi, 'A policy language for a pervasive computing environment', In Proc. of IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003 https://doi.org/10.1109/POLICY.2003.1206958
  11. H. Chen, F. Perich, T. Finin and A. Joshi, 'SOUPA: standard ontology for ubiquitous and pervasive applications', In Proc. of Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITDUS), Aug., 2004 https://doi.org/10.1109/MOBIQ.2004.1331732
  12. D. Kulkarni and A. Tripath, 'Context-Aware Rolebased Access Control in Pervasive Computing Systems', SACMAT '08, June 11-13, 2008, Colorado, USA https://doi.org/10.1145/1377836.1377854
  13. P. Nasirifard, 'Context-Aware Access Control for Collaborative Working Environments Based on Semantic Social Networks', In Proc. of International and Interdisciplinary Conference on Modeling and Using Context (CONTEXT'07), Roskilde, Denmark, 2007
  14. A. Samuel, A. Ghafoor and E. Bertino, 'ContextAware Adaptation of Access-Control Policies', IEEE Internet Computing, Vol. 12, No.1, 2008 https://doi.org/10.1109/MIC.2008.6
  15. A. Toninelli, R. Montanari, L. Kagal and O. Lassila, 'A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments', In Proc. of International Semantic Web Conference, 2006 https://doi.org/10.1007/11926078_34
  16. U. Hengartner and G. Zhong, 'Distributed, Uncertainty- Aware access Control for Pervasive Computing', In Proc. of IEEE PerComW i '07, 2007 https://doi.org/10.1109/PERCOMW.2007.39
  17. R.J. Hulsebosch et. aI, 'Context Sensitive Access Control', In Proc. of SACMAT '05, June, 2005, Stockholm, Sweden
  18. E. Snekkenes, 'Concepts for personal location privacy policies', In Proc. of the 3rd ACM conference on Electronic Commerce, PP. 48-57, 2001 https://doi.org/10.1145/501158.501164
  19. GeoPriv Location/Privacy (geopriv), http://www.ietf.org/html. charters/ geopriv-charter. html
  20. L. Cranor, M. Langheinrich and M. Marchiori, 'A P3P preference exchange language 1.0 (APPEL1. 0), April 2002, http://www.w3.org/TR/P3P-preferences
  21. E.-S. Cho, K,-W. Lee and M. Hong, 'Abstraction for Privacy in Context-Aware Environments', MATA-05, 2005
  22. F. L. Gandon and N. M. Sadeh. 'A Semantic e-Wallet to Reconcile Privacy and Context Awareness.' In Proc. of International Semantic Web Conference (ISWC2003), pp. 385-401, 2003, Sanivel Island, Florida, USA
  23. R. Wishart, K. Henricksen and J. Indulska, 'Context obfuscation for privacy via ontological descriptions' In Proc. of Workshop on Location and ContextAwareness (LoCA), 2005 https://doi.org/10.1007/11426646_26
  24. L. Pareschi, D. Riboni and C. Bettini, 'Protecting Users' Anonymity', In Proc. of Pervasive Computing Environments (PerCom), 2008 https://doi.org/10.1109/PERCOM.2008.58
  25. Grusteser et. aI, 'Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking', In Proc. of Mobisys 2003 https://doi.org/10.1145/1066116.1189037
  26. B. Gedik and L. Liu. 'A Customizable k-Anonymity Model for Protecting Location Privacy', In Proc. of IEEE ICDCS, 2005