Journal of Engineering and Applied Sciences
Year:
2017
Volume:
12
Issue:
3
Page No.
722 - 733
References
Ausanka-Crues, R., 2001. Methods for access control: Advances and limitations. Harvey Mudd College, Claremont, California. https://www.cs.hmc.edu/~mike/public_html/courses/security/s06/projects/ryan.pdf.
Belokosztolszki, A., 2004. Role-based access control policy administration. Ph.D Thesis, University of Cambridge, Cambridge, England.
Derakhshan, R., M.E. Orlowska and X. Li, 2007. RFID data management: Challenges and opportunities. Proceedings of the IEEE International Conference on RFID, March 26-28, 2007, Grapevine, TX., USA., pp: 175-182.
Dey, A.K., G.D. Abowd and A. Wood, 1998. CyberDesk: A framework for providing self-integrating context-aware services. Knowledge Based Syst., 11: 3-13.
Direct Link | Dey, A.K., G.D. Abowd and D. Salber, 2001. A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Human-Comput. Interact., 16: 97-166.
CrossRef | Hong, J.Y., E.H. Suh and S.J. Kim, 2009. Context-aware systems: A literature review and classification. Expert Syst. Appl., 36: 8509-8522.
Direct Link | Hu, V.C. and K.A. Kent, 2012. Guidelines for access control system evaluation metrics. US Department of Commerce, National Institute of Standards and Technology, Gaithersburg, Maryland. https://pdfs.semanticscholar.org/b01a/85f6fb0d3ca85e49955af9d87cea830b55ff.pdf.
Hwang, J., T. Xie and V.C. Hu, 2009. Detection of multiple-duty-related security leakage in access control policies. Proceedings of the 3rd IEEE International Conference on Secure Software Integration and Reliability Improvement, July 8-10, 2009, IEEE, North Carolina, USA., ISBN:978-0-7695-3758-0, pp: 65-74.