Reference16 articles.
1. A Location Model for Communicating and Processing of Context;Beigl;Personal and Ubiquitous Computing,2002
2. COSMOS: A Context-centric Access Control Middleware for Mobile Environments;Bellavista;Proceedings of Mobile Agents for Telecommunication Applications (MATA’2003), LNCS,2003
3. B. L. Brumitt, B. Meyers, J. Krumm, A. Kern, S. Shafer: EasyLiving: Technologies for Intelligent Environments, Proceedings of International Symposium on Handheld and Ubiquitous Computing, pp. 12-27, 2000.
4. M.J. Covington, W. Long, S. Srinivasan, A.K. Dev, M. Ahamad, and G. D. Abowd: Securing context-aware applications using environment roles, In Proceedings of 6th ACM symposium on Access Control Models and Technologies (SACMAT’2001). pp.10-20. 2001.
5. A role based access control model and reference implementation within a corporate intranet;Ferraiolo;ACM Transactions on Information Systems Security,1999
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Location-aware IT system security using IoT in multizone;Proceedings of the 28th Annual International Conference on Mobile Computing And Networking;2022-10-14
2. Digital Twin Monitoring for Cyber-Physical Access Control;Communications in Computer and Information Science;2022
3. Access Control Requirements for Physical Spaces Protected by Virtual Perimeters;Trust, Privacy and Security in Digital Business;2018