1 |
커뮤니티 컴퓨팅-위키백과, http://ko. wikipedia.org/wiki/커뮤니티-컴퓨팅
|
2 |
P. Reddivari et al., 'Policy based Access Control for a RDF Store', In Proc. of the Policy Management for the Web Workshop, May, 2005
|
3 |
L. Kagal, T. Finin and A. Joshi, 'A policy language for a pervasive computing environment', In Proc. of IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003
DOI
|
4 |
D. Kulkarni and A. Tripath, 'Context-Aware Rolebased Access Control in Pervasive Computing Systems', SACMAT '08, June 11-13, 2008, Colorado, USA
DOI
|
5 |
A. Toninelli, R. Montanari, L. Kagal and O. Lassila, 'A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments', In Proc. of International Semantic Web Conference, 2006
DOI
ScienceOn
|
6 |
U. Hengartner and G. Zhong, 'Distributed, Uncertainty- Aware access Control for Pervasive Computing', In Proc. of IEEE PerComW i '07, 2007
DOI
|
7 |
R.J. Hulsebosch et. aI, 'Context Sensitive Access Control', In Proc. of SACMAT '05, June, 2005, Stockholm, Sweden
|
8 |
R. Wishart, K. Henricksen and J. Indulska, 'Context obfuscation for privacy via ontological descriptions' In Proc. of Workshop on Location and ContextAwareness (LoCA), 2005
DOI
ScienceOn
|
9 |
L. Pareschi, D. Riboni and C. Bettini, 'Protecting Users' Anonymity', In Proc. of Pervasive Computing Environments (PerCom), 2008
DOI
|
10 |
Grusteser et. aI, 'Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking', In Proc. of Mobisys 2003
DOI
|
11 |
http://www. w3.org/TR/rdf-mt/#RDFSRules
|
12 |
E.-S. Cho, K,-W. Lee and M. Hong, 'Abstraction for Privacy in Context-Aware Environments', MATA-05, 2005
|
13 |
L. Pareschi, D. Riboni, A. Agostini and C. Bettini, 'Composition and Generalization of Context Data for Privacy Preservation', In Proc. of 6th IEEE International Conference on Pervasive Computing and Communications (PerCom), Mar, 2008, Hong Kong
DOI
|
14 |
P. Nasirifard, 'Context-Aware Access Control for Collaborative Working Environments Based on Semantic Social Networks', In Proc. of International and Interdisciplinary Conference on Modeling and Using Context (CONTEXT'07), Roskilde, Denmark, 2007
|
15 |
L. Qin and V. Atluri, "Concept-level access control for the Semantic Web", In Proc. of ACM workshop on XMLsecurity (XMLSEC '03), 2003
DOI
|
16 |
S. Jajodia, R. and S. Sandhu, 'Toward a multilevel secure relational data model', In ACM SIGMOD Record, Vol. 20, No.2, pp. 50-59, Jun., 1991
DOI
|
17 |
H. Chen, F. Perich, T. Finin and A. Joshi, 'SOUPA: standard ontology for ubiquitous and pervasive applications', In Proc. of Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITDUS), Aug., 2004
DOI
|
18 |
A. Jain and C. Farkas, 'Secure resource description framework: an access control model', In Proc. of ACM symposium on Access control models and technologies(SACMAT '06), pp 121-129, 2006, Lake Tahoe, California, USA
DOI
|
19 |
A. Samuel, A. Ghafoor and E. Bertino, 'ContextAware Adaptation of Access-Control Policies', IEEE Internet Computing, Vol. 12, No.1, 2008
DOI
ScienceOn
|
20 |
E. Snekkenes, 'Concepts for personal location privacy policies', In Proc. of the 3rd ACM conference on Electronic Commerce, PP. 48-57, 2001
DOI
|
21 |
GeoPriv Location/Privacy (geopriv), http://www.ietf.org/html. charters/ geopriv-charter. html
|
22 |
L. Cranor, M. Langheinrich and M. Marchiori, 'A P3P preference exchange language 1.0 (APPEL1. 0), April 2002, http://www.w3.org/TR/P3P-preferences
|
23 |
E. Bertino and E. Ferrari, 'Secure and selective dissemination of XML documents', In Transactions on Information and System Security (TISSEC), Vol. 5 No.3, Aug., 2002
DOI
|
24 |
B. Gedik and L. Liu. 'A Customizable k-Anonymity Model for Protecting Location Privacy', In Proc. of IEEE ICDCS, 2005
|
25 |
F. L. Gandon and N. M. Sadeh. 'A Semantic e-Wallet to Reconcile Privacy and Context Awareness.' In Proc. of International Semantic Web Conference (ISWC2003), pp. 385-401, 2003, Sanivel Island, Florida, USA
|
26 |
U. Hengartner and P. Steenkiste, 'Access Control to Information in Pervasive Computing Environments', In Proc. of HotOS, 2003
|