Author:
Ray Indrakshi,Kumar Mahendra,Yu Lijun
Publisher
Springer Berlin Heidelberg
Reference9 articles.
1. Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: GEO-RBAC: A Spatially Aware RBAC. In: Proceedings of the ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden (June 2005)
2. Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: A Context-Aware Security Architecture for Emerging Applications. In: Proceedings of the Annual Computer Security Applications Conference, Las Vegas, NV, USA, December 2002, pp. 249–260 (2002)
3. Covington, M.J., Long, W., Srinivasan, S., Dey, A., Ahamad, M., Abowd, G.: Securing Context-Aware Applications Using Environment Roles. In: Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, Chantilly, VA, USA, May 2001, pp. 10–20 (2001)
4. Denning, D.E., MacDoran, P.F.: Location-Based Authentication: Grounding Cyberspace for Better Security. In: Computer Fraud and Security. Elsevier Science Ltd., Amsterdam (1996)
5. Hengartner, U., Steenkiste, P.: Implementing Access Control to People Location Information. In: Proceeding of the SACMAT 2004, Yorktown Heights, California,USA (June 2004)
Cited by
49 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automatic Conversion of ABAC Policies for RBAC Systems;2023 IEEE Conference on Dependable and Secure Computing (DSC);2023-11-07
2. Research on access control technology of big data cloud computing;2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA);2023-05-26
3. A review of security issues and solutions for precision health in Internet-of-Medical-Things systems;Security and Safety;2023
4. A machine learning-enabled intelligent application for public health and safety;Neural Computing and Applications;2021-08-11
5. Access Control Challenges in Enterprise Ecosystems;Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government;2021