1. Al-Muhtadi, J., Hill, R., Campbell, R., Mickunas, D., 2006. Context and location-aware encryption for pervasive computing environments. In: Third IEEE International Workshop on Pervasive Computing and Communication Security (PerSec).
2. Bardam, J., 2004. Applications of context aware computing in hospital work – Examples of design principles. In: ACM Symposium on Applied Computing.
3. Covington, M.J., Moyer, M.J., Ahamad, M., 2000. Generalized role-based access control for securing future applications. In: 23rd National Information Systems Security Conference.
4. Covington, M.J., Long, W., Srinivasan, S., Dey, A.K., Ahamad, M., Abowd, G.D., 2001. Securing context-aware applications using environment roles. In: SACMAT, Virginia, USA.
5. Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M., 2002. A Context-aware security architecture for emerging applications. In: 18th ACSAC, Las Vegas, NV.