1 |
Anind K. Dey and Gregory D. Abowd, 'Towards a Better Understanding of Context and Context-Awareness', In Workshop on The What, Who, Where, When, and How of Context-Awareness, as part of the 2000 Conference on Human Factors in Computing Systems (CHI 2000), The Hague, The Netherlands, April 3, 2000
|
2 |
C.K. Georgiadis, I. Mavridis, G. Pangalos and R. K. Thomas, 'Flexible Team-Based Access Control Using Contexts', In ACM Symposium on Access Control Models and Technologies (SACMAT2001), pp.21-30, May 2001
|
3 |
M. Wilikens, S. Feriti, A. Sanna and M. Masera, 'A Context-Related Authorization and Access Control Method Based on RBAC : A case study from the health care domain', In 7th ACM Symposium on Access Control Models and Technologies(SACMAT2002), pp. 117-124, 2002
|
4 |
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman, 'Role Based Access Control Model.', In IEEE Computer, 20(2), pp.38-47, February 1996
|
5 |
Gustaf Neumann and Mark Strembeck, 'An Approach to Engineer and Enforce Context Constraints in an RBAC Environment', In 8th ACM Symposium on Access Control Models and Technologies (SACMAT2003), pp. 65-79, Como, Italy, June 2003
|
6 |
Ravi Sandhu, David Ferraiolo, and Richard kuhn, 'The NIST Model for Role-Based Access Control: Towards A Unified Approach', In ACM Workshop on Role-Based Access Control. pp. 47-63, 2000
|
7 |
M. J. Covington, M.J. Moyer and M. Ahamad, 'Generalized Role-based Access Control for Securing Future Applications', In 23rd National Information Systems Security Conference (NISSC), pp.115-125, Baltimore, Maryland, USA, October 2000
|
8 |
조영섭, 조상래, 유인태, 진승헌, 정교일, '유비쿼터스 컴퓨팅과 정보보호; 유비쿼터스 컴퓨팅과 보안요구사항 분석', 정보보호학회지, 제14권 제1호, 2004
|
9 |
Anind K. Dey and Gregory D. Abowd, 'Understanding and Using Context', In Personal and Ubiquitous Computing Journal, Springer Verlag, 5(1), pp.4-7, 2001
DOI
ScienceOn
|
10 |
박춘식, '유비쿼터스 네트워크와 시큐리티 고찰', 정보보호학회지, 제14권 제1호, 2004
|
11 |
김완석, 김정국, '유비쿼터스 컴퓨팅과 정보보호; 유비쿼터스 컴퓨팅의 발전 전망과 보안에 대한 이슈', 정보보호학회지, 제14권 제1호, 2004
|
12 |
Mark Weiser, 'Some Computer Science Issues in Ubiquitous Computing', In Communications of the ACM , 36(7), pp.4-7, July 1993
|
13 |
Matthew J. Moyer and Mustaque Ahamad, 'Generalized Role-based Access Control', In IEEE International Conference on Distributed Computing Systems(ICDCS2001), pp.391- 398, Mesa, Arizona, USA, April 2001
|