Author:
Ray Indrakshi,Toahchoodee Manachai
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: a temporal role-based access control model. In: RBAC 2000: Proceedings of the fifth ACM workshop on Role-based access control, pp. 21–30. ACM Press, New York, NY, USA (2000)
2. Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. In: SACMAT 2005: Proceedings of the tenth ACM symposium on Access control models and technologies, pp. 29–37. ACM Press, New York (2005)
3. Chandran, S.M., Joshi, J.B.D.: LoT-RBAC: A Location and Time-Based RBAC Model. In: WISE, pp. 361–375 (2005)
4. Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: A Context-Aware Security Architecture for Emerging Applications. In: Proceedings of the Annual Computer Security Applications Conference, Las Vegas, NV, USA, pp. 249–260 (December 2002)
5. Covington, M.J., Long, W., Srinivasan, S., Dey, A., Ahamad, M., Abowd, G.: Securing Context-Aware Applications Using Environment Roles. In: Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, pp. 10–20. Chantilly, VA, USA (May 2001)
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure Access Control for Healthcare Information Systems: A Body Area Network Perspective;2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC);2023-03-08
2. SoK: Context and Risk Aware Access Control for Zero Trust Systems;Security and Communication Networks;2022-06-30
3. Intrusion detection system for data warehouse with second level authentication;International Journal of Information Technology;2021-04-17
4. A Review of Applications, Security and Challenges of Internet of Medical Things;Cognitive Internet of Medical Things for Smart Healthcare;2020-10-20
5. The Next 700 Policy Miners;Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security;2019-11-06