共 50 条
- [21] A Context-Aware Access Control Model for Pervasive Computing in Enterprise Environments [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4572 - 4577
- [22] Privacy Aware Access Control for Data Sharing in Cloud Computing Environments [J]. SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 27 - 34
- [23] Enforcing Privacy as Access Control in a Pervasive Context [J]. 2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 380 - 384
- [24] Pervasive data access in wireless and mobile computing environments [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01): : 25 - 44
- [26] An authorization and access control scheme for pervasive computing [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2004, : 726 - 733
- [28] User Access of Public Shared Devices in Pervasive Computing Environments [J]. 2007 JOINT WORKSHOP ON HIGH CONFIDENCE MEDICAL DEVICES, SOFTWARE AND SYSTEMS AND MEDICAL DEVICE PLUG-AND PLAY INTEROPERABILITY, 2007, : 57 - 63
- [29] A Semantic-Aware Role-Based Access Control Model for Pervasive Computing Environments [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 5 (02): : 119 - 140