A Unified High-Level Petri Net Formalism for Time-Critical Systems
IEEE Transactions on Software Engineering
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
An access control model supporting periodicity constraints and temporal reasoning
ACM Transactions on Database Systems (TODS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
A model for role administration using organization structure
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A Temporal Access Control Mechanism for Database Systems
IEEE Transactions on Knowledge and Data Engineering
The Analysis of Distributed Systems by Means of Predicate ? Transition-Nets
Proceedings of the International Sympoisum on Semantics of Concurrent Computation
Cooperative role-based administration
Proceedings of the eighth ACM symposium on Access control models and technologies
Dependencies and separation of duty constraints in GTRBAC
Proceedings of the eighth ACM symposium on Access control models and technologies
An approach to engineer and enforce context constraints in an RBAC environment
Proceedings of the eighth ACM symposium on Access control models and technologies
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Modular authorization and administration
ACM Transactions on Information and System Security (TISSEC)
Information exposure control through data manipulation for ubiquitous computing
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Ubiquitous computing environments and its usage access control
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
A Monte Carlo framework to evaluate context based security policies in pervasive mobile environments
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
Access control management for ubiquitous computing
Future Generation Computer Systems
A trusted decentralized access control framework for the client/server architecture
Journal of Network and Computer Applications
New role-based access control in ubiquitous e-business environment
Journal of Intelligent Manufacturing
LoT-RBAC: a location and time-based RBAC model
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
Role-Based access control model for ubiquitous computing environment
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Modelling context-aware RBAC models for mobile business processes
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
In the era of Ubiquitous Computing and world-wide data transfer mobility, as an innovative aspect of professional activities, imposes new andcomplex problems of mobile and distributed access to information,services, and on--line negotiations for this purpose. This paperrestricts itself to presenting a distributed and location--dependentRBAC approach which is multi--layered. Also an adapted form ofAdministration Nets is presented whichallows the scheduling of distributed on--line processes for automatedlocation--dependent negotiating procedures, and for provingtheir correctness. Examples are discussed in some detail.