ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Context-Aware Dynamic Access Control
Encyclopedia of GIS
◽
10.1007/978-0-387-35973-1_197
◽
2008
◽
pp. 160-160
Author(s):
Shashi Shekhar
◽
Hui Xiong
Keyword(s):
Access Control
◽
Context Aware
◽
Dynamic Access Control
Download Full-text
Related Documents
Cited By
References
Extended Risk-Based Context-Aware Model for Dynamic Access Control in Bring Your Own Device Strategy
Machine Learning and Data Mining for Emerging Trend in Cyber Dynamics
◽
10.1007/978-3-030-66288-2_12
◽
2021
◽
pp. 295-315
Author(s):
Shefiu Olusegun Ganiyu
◽
Rasheed Gbenga Jimoh
Keyword(s):
Access Control
◽
Bring Your Own Device
◽
Context Aware
◽
Dynamic Access Control
Download Full-text
Context-Aware Dynamic Access Control
Encyclopedia of GIS
◽
10.1007/978-3-319-17885-1_100207
◽
2017
◽
pp. 339-339
Keyword(s):
Access Control
◽
Context Aware
◽
Dynamic Access Control
Download Full-text
Context-Aware Dynamic Access Control
10.1007/springerreference_61853
◽
2011
◽
Keyword(s):
Access Control
◽
Context Aware
◽
Dynamic Access Control
Download Full-text
Context-aware semantic-based access control model for semantic Web
Journal of Computer Applications
◽
10.3724/sp.j.1087.2009.01289
◽
2009
◽
Vol 29
(5)
◽
pp. 1289-1292
◽
Cited By ~ 1
Author(s):
Hai-bo SHEN
Keyword(s):
Access Control
◽
Semantic Web
◽
Control Model
◽
Context Aware
◽
Access Control Model
Download Full-text
Dynamic access control model for pervasive computing
Journal of Computer Applications
◽
10.3724/sp.j.1087.2008.01931
◽
2008
◽
Vol 28
(8)
◽
pp. 1931-1935
Author(s):
Li-chen ZHANG
Keyword(s):
Access Control
◽
Pervasive Computing
◽
Control Model
◽
Access Control Model
◽
Dynamic Access Control
Download Full-text
Mitigation of Malicious Flooding in Software Defined Networks Using Dynamic Access Control List
Wireless Personal Communications
◽
10.1007/s11277-021-08626-6
◽
2021
◽
Author(s):
J. Ramprasath
◽
V. Seethalakshmi
Keyword(s):
Access Control
◽
Software Defined Networks
◽
Access Control List
◽
Dynamic Access Control
Download Full-text
Dynamic access control technology based on zero-trust light verification network model
2021 International Conference on Communications, Information System and Computer Engineering (CISCE)
◽
10.1109/cisce52179.2021.9445896
◽
2021
◽
Author(s):
Pengfeng Zhang
◽
Chuan Tian
◽
Tao Shang
◽
Lin Liu
◽
Lei Li
◽
...
Keyword(s):
Access Control
◽
Network Model
◽
Control Technology
◽
Dynamic Access Control
Download Full-text
Dynamic access-control policies on XML encrypted data
ACM Transactions on Information and System Security
◽
10.1145/1284680.1284684
◽
2008
◽
Vol 10
(4)
◽
pp. 1-37
◽
Cited By ~ 2
Author(s):
Luc Bouganim
◽
Francois Dang Ngoc
◽
Philippe Pucheral
Keyword(s):
Access Control
◽
Control Policies
◽
Encrypted Data
◽
Access Control Policies
◽
Dynamic Access Control
Download Full-text
Context-aware Role-based Access Control Using Security Levels
Proceedings of the 2015 Conference on research in adaptive and convergent systems - RACS
◽
10.1145/2811411.2811498
◽
2015
◽
Author(s):
Michal Trnka
◽
Tomas Cerny
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Context Aware
◽
Security Levels
◽
Role Based
Download Full-text
A Multi-level Dynamic Access Control Model and Its Formalization
2015 2nd International Conference on Information Science and Control Engineering
◽
10.1109/icisce.2015.14
◽
2015
◽
Cited By ~ 3
Author(s):
Yanjie Zhou
◽
Li Ma
◽
Min Wen
Keyword(s):
Access Control
◽
Control Model
◽
Access Control Model
◽
Multi Level
◽
Dynamic Access Control
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close