Author:
Kayes A. S. M.,Han Jun,Colman Alan
Publisher
Springer Berlin Heidelberg
Reference8 articles.
1. Weiser, M.: Some Computer Science Issues in Pervasive Computing. Communications of the ACM 36(7), 75–84 (1993)
2. Dey, A.K.: Understanding and Using Context. Personal and Ubiquitous Computing 5(1), 4–7 (2001)
3. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based Access Control Models. IEEE Computer 29(2), 38–47 (1996)
4. Covington, M.J., Moyer, M., Ahmad, M.: Generalized Role-based Access Control for Securing Future Applications. In: Proceedings of the 23rd National Information Systems Security Conference, Baltimore, USA (2000)
5. Bertino, E., Catania, B., Damini, M.L., Perlasca, P.: GEO-RBAC: A Spa-tially Aware RBAC. In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, pp. 29–37. ACM, New York (2005)
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献