共 50 条
- [21] Research on Mobile-Agent Based Data Access Model in Pervasive Computing Environment [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1523 - +
- [22] An XML Based Access Control Architecture for Pervasive Computing [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 803 - +
- [23] A Quality-Aware Context-Based Access Control Model for Ubiquitous Applications [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 115 - 120
- [24] Context-based access control management in ubiquitous environments [J]. THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 253 - 260
- [26] Semantic-based Obligation for Context-Based Access Control [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 535 - 540
- [27] Context-Based Conflict Management in Pervasive Platforms [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2017,
- [28] Profile Based Access Control Model in Cloud Computing Environment [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
- [29] Towards the realisation of context-risk-aware access control in pervasive computing [J]. Telecommunication Systems, 2010, 45 : 127 - 137
- [30] A Context-Aware Access Control Model for Pervasive Environments [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 425 - +