1 |
Kumar, N., Chafle, G., "Context Sensitivity in Role-based Access Control", Operating Systems Review, Vol. 36, No. 3, IBM Journal, 2002
|
2 |
Wang, X.H., Xhang, D.Q., Gu, T., and Pung, H.K., "Ontology Based Context Modeling and Reasoning using OWL", in PerCom2004 Annual Conference on Pervasive computing and Communications Workshop, 2004
|
3 |
Rastogi et al, "Access Control over Uncertain Data", PVLDB '08, 2008.
|
4 |
P. Balbiani, "Acces control with uncertain surveillance", International Conference on Web Intelligence, 2005.
|
5 |
Dalvi et al, "Efficient query evaluation on probabilistic databases", VLDB J, 2007.
|
6 |
Sandhu, R., Ferraiolo, D., and Kuhm, R., "The NIST Model for Role-Based Access Control: Towards A Unified Standard", in Proceedings of the fifth ACM workshop on Role-based access control, 2000
|
7 |
Ranganathan, R, Campbell R.H., "An Infrastructure for context-awareness based on first-order logic", Personal and Ubiquitous Computing, Vol. 7, Issue 6, 2003
|
8 |
Qin, L., Atluri, V., "Concept-level Access Control for the Semantic Web", in ACM Workshop on XML Security, 2003.
|
9 |
Byun, J., Bertino, E., Li, N., "Purpose-based Access Control of Complex Data for Privacy Protection", SACMAT, pp102-110, 2005
|
10 |
Weiser, M., "Hot Topics: Ubiquitous Computing", IEEE Computer, 1993.
DOI
ScienceOn
|