1 |
ETSI TS 102 690 v0.10.1, "Machine-to-Machine communications(M2M); M2M functional architecture," 2011.
|
2 |
SY, Na. et al., "Smart phones and mobile office security issues and strategies," National information society agency, vol. 26, pp. 12-20, 2010.
|
3 |
A. K. Dey, "Understanding and using context," Personal and Ubiquitous Computing, vol. 5, no. 1, pp. 4-7, 2001.
DOI
ScienceOn
|
4 |
Schilit, B., Adams and N. Want, R., "Context-Aware computing applications," in Proc. of the 1st International Workshop on mobile Computing Systems and Applications, pp. 85-90, 1995.
|
5 |
H Chen, "An intelligent broker architecture for pervasive context-aware systems," PhD thesis of UMBC, 2004.
|
6 |
Gaia project, http://gaia.cs.uiuc.edu/
|
7 |
Gu, T. et al., "An ontology-based context model in intelligent environments," in Proc. of Communication Networks and Distributed Systems Modeling and Simulation Conference, 2004.
|
8 |
H. Kim et al., "CAMUS - A middleware supporting context-aware services for network-based robots," in Proc. IEEE Workshop on Advanced Robotics and Its Social Impacts, 2005.
|
9 |
L. A. Zadeh, "Fuzzy sets," Information and Control, vol.8, pp. 338-353, 1965.
DOI
|
10 |
R. L. Keeney and H. Raiffa, "Decisions with Multiple Objectives: Preferences and Value Tradeoffs," Cambridge university press, pp . 261-271, 1993.
|
11 |
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C.E.Youman, "Role-based access control models," IEEE Computer, vol. 29, no. 2, pp. 38 - 47, Feb. 1996.
DOI
ScienceOn
|
12 |
M.J.Convington, M.J Moyer, and M.Ahamad, "Generalized role-based access control for Securing future applications," in Proc of 23rd National Information Systems Security Conference (NISSC), pp. 115-125, 2000.
|
13 |
M.J. Moyer and M.Ahamad, "Generalized Role-Based Access Control," in Proc. of IEEE Int'l Conf. on Distributed Computing Systems (ICDSC2001), pp. 391-398, 2001.
|
14 |
KH. Nam. et al., "Smartphone security technology and solution trends," Weekly Technical Trends, No. 1466, pp. 1-7, 2010.
|
15 |
ETSI TS 102 689 v1.1.1, "Machine-to-Machine communications(M2M); M2M service requirements," 2010.
|