The Z notation: a reference manual
The Z notation: a reference manual
Access Control for Active Spaces
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Cerberus: A Context-Aware Security Scheme for Smart Spaces
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Modelling smart security for classified rooms with DOVE
CRPIT '02 Proceedings of the conference on Application and theory of petri nets: formal methods in software engineering and defence systems - Volume 12
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
SAINT '05 Proceedings of the The 2005 Symposium on Applications and the Internet
Computer Network Security
A Framework for Supporting Distributed Access Control Policies
ISCC '05 Proceedings of the 10th IEEE Symposium on Computers and Communications
Authentication and Access Control Agent Framework for Context-Aware Services
SAINT-W '05 Proceedings of the 2005 Symposium on Applications and the Internet Workshops
Designing and Modeling Smart Environments (Invited Paper)
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
A framework for decentralized access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Integrated Development of Context-Aware Applications in Smart Spaces
IEEE Pervasive Computing
Together we are strong— towards ad-Hoc smart spaces
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
Architecture framework for device single sign on in personal area networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Hi-index | 0.00 |
Security in depth relies on controlled access across a layering of protective barriers. We introduce smart space cascades, a framework in which access control is applied to a hierarchy of smart spaces, as a way of achieving security in depth in the context of highly automated work environments.