1 |
Weiser, M., "Hot Topics: Ubiquitous Computing", IEEE Computer, 1993.
|
2 |
Kumar, N., Chafle, G., "Context Sensitivity in Role-based Access Control", Operating Systems Review, Vol. 36, No. 3, IBM Journal, 2002
|
3 |
Wang, X.H., Xhang, D.Q., Gu, T., and Pung, H.K., "Ontology Based Context Modeling and Reasoning using OWL", in PerCom2004 Annual Conference on Pervasive computing and Communications Workshop, 2004
|
4 |
Powers, C.S., Ashley, P., Schunter, M., "Privacy Promises, Access Control and Privacy Management," Proc. of the 3rd International Symposium on Electronic Commerce, pp. 13-21, IEEE, 2002.
|
5 |
Y. Kim, J. Kim, J. Han, "The structural relationships among user citizenship behavior, aberrant user behavior, social connectedness, privacy concern, and user satisfaction", Journal of the Korea Academia-Industrial cooperation Society, Vol.13, No.11 pp.4994-5004, 2012
DOI
ScienceOn
|
6 |
B. Rhee, Y. Jeong, S. Lee, "Privacy Model based on RBAC for U-Healthcare Service Environment", Journal of Korean Institute of Information Technology, vol. 9, issue 9, April, 2011.
|
7 |
Bertino., E., Castano, S., Ferrari, E. and Mesiti, M., "Specifying and Enforcing Access Control Policies for XML Document Sources", WWW Journal, Baltzer Science Publishers, Vol. 3, No. 3, pp. 139-151, 2000.
|
8 |
Rastogi et al, "Access Control over Uncertain Data", PVLDB '08, 2008.
|
9 |
P. Balbiani, "Access control with uncertain surveillance", International Conference on Web Intelligence, 2005.
|
10 |
Dalvi et al, "Efficient query evaluation on probabilistic databases", VLDB J, 2007.
|
11 |
Woo-Jun Kang, "A Method for Access Control on Uncertain Context", Journal of the Institute of Internet, Broadcasting and Communication (JIIBC), Vol. 10, No. 6, pp. 215-223, 2010.
|
12 |
Woo-Jun Kang, "A Method for Semantic Access Control using Hierarchy Tree", Journal of the Institute of Internet, Broadcasting and Communication (JIIBC), Vol. 11, No. 6, pp. 223-234, 2011.
|
13 |
Qin, L., Atluri, V., "Concept-level Access Control for the Semantic Web", in ACM Workshop on XML Security, 2003.
|
14 |
Woo-Jun Kang, "An Efficient Privacy Preserving Method based on Semantic Security Policy Enforcement", Journal of the Institute of Internet, Broadcasting and Communication (JIIBC), Vol. 13, No. 6, pp. 173-186, 2013.
DOI
|
15 |
Sandhu, R., Ferraiolo, D., and Kuhm, R., "The NIST Model for Role-Based Access Control: Towards A Unified Standard", in Proceedings of the fifth ACM workshop on Role-based access control, 2000
|
16 |
Byun, J., Bertino, E., Li, N., "Purpose-based Access Control of Complex Data for Privacy Protection", SACMAT, pp102-110, 2005
|
17 |
Adam, N.R., Atluri, V., "A Content-based Authorization Model for Digital Libraries", IEEE Transactions on knowledge and data engineering, Vol. 14, No. 2, 2002.
|
18 |
Chandramouli, R., "A Framework for Multiple Authorization Types in a Healthcare Application System", Proc. of the 17th Annual Computer Security applications Conference (ACSAC 2001), pp. 137-148,
|
19 |
Covington, M.J., Srinivasan, S., Abowd, G., "Securing context-aware applications using environment roles", in SACMAT 2001.
|
20 |
Bertino, E., Castano, S., and Ferrai, E., "Securing XML documents with Author-x", IEEE InternetComputing, May.June, pp. 21-31, 2001.
|
21 |
Haarslev, V., Moller, R., "Racer: A Core Inference Engine for the Semantic Web", in Proceedings of the 2nd International Workshop on Evaluation of Ontology-based Tools (EON2003), located at the 2nd International Semantic Web Conference ISWC 2003, Sanibel Island, Florida, USA, October 20, 2003.
|
22 |
Bitton, D., Dewitt, D.J., Turbyfill, C., "Benchmarking database systems: a system approach", In: 9th International Conference on Very Large Data Base, VLDB, 1983.
|