Author:
Bai Guangdong,Gu Liang,Feng Tao,Guo Yao,Chen Xiangqun
Publisher
Springer Berlin Heidelberg
Reference34 articles.
1. Lecture Notes in Computer Science;S. Aich,2007
2. Al-Muhtadi, J., Ranganathan, A., Campbell, R.H., Mickunas, M.D.: Cerberus: A context-aware security scheme for smart spaces. In: PerCom, p. 489 (2003)
3. Bandinelli, M., Paganelli, F., Vannuccini, G., Giuli, D.: A contextaware security framework for next generation mobile networks. In: MobiSec. Springer, Heidelberg (2009)
4. Bell, D., LaPadula, L.: Secure computer systems: Mathematical foundations. Technical Report ESD-TR-73-278, MITRE Corporation (1973)
5. Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst. 23(3), 231–285 (1998)
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Enhanced Usage Control for data sharing in Industrial Internet;Proceedings of the 8th International Conference on Communication and Information Processing;2022-11-03
2. Putting Context in the Network Access of Mobile Applications Using Fuzzy Analytic Hierarchy Process;International Journal of Decision Support System Technology;2019-04
3. How to Block the Malicious Access to Android External Storage;Lecture Notes in Computer Science;2019
4. ProCMotive;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies;2018-03-26
5. Security Policy Model for Ubiquitous Social Systems;Modeling and Using Context;2017