共 50 条
- [1] A context-based delegation access control model for pervasive computing [J]. 21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 44 - +
- [2] Context-based secure resource access in pervasive computing environments [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 159 - 163
- [3] Pervasive computing context access control based on UCONABC model [J]. IIH-MSP: 2006 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2006, : 689 - +
- [4] A context, rule and role-based access control model in enterprise pervasive computing environment [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 497 - +
- [5] Context-based media adaptation in Pervasive Computing [J]. CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING 2001, VOLS I AND II, CONFERENCE PROCEEDINGS, 2001, : 913 - 918
- [6] Using Context Quality Indicators for Improving Context-based Access Control in Pervasive Environments [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 285 - 290
- [7] Privacy challenges in Context-sensitive access control for pervasive computing environment [J]. 2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 510 - 515
- [8] A context-aware access control model for pervasive computing environments [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 51 - +
- [9] Context-based Access Control Model for Smart Space [J]. 2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
- [10] Security Access Model in Pervasive Computing Environment [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (04): : 959 - 965