Securing context-aware applications using environment roles
Top Cited Papers
- 1 May 2001
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Access control in an open distributed environmentPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A role-based access control model and reference implementation within a corporate intranetACM Transactions on Information and System Security, 1999
- Exploiting human actions and object context for recognition tasksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1999
- A unified framework for enforcing multiple access control policiesPublished by Association for Computing Machinery (ACM) ,1997
- Role templates for content-based access controlPublished by Association for Computing Machinery (ACM) ,1997
- A temporal access control mechanism for database systemsIEEE Transactions on Knowledge and Data Engineering, 1996
- Role-based access control modelsComputer, 1996
- Access control for collaborative environmentsPublished by Association for Computing Machinery (ACM) ,1992
- A Global Authentication Service without Global TrustPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986