References
- Frank Stajano and Ross Anderson, 'The Resurrecting Duckling: Security Issues for Ubiquitous Computing,' Proc. of 7th International Workshop on Security Protocols, 1994
- Upkar Varshney, 'Network Access and Security Issues in Ubiquitous Computing,' Proc. of Workshop on Ubiquitous Computing Environment, 2003
- Rattapoom Tuchinda, 'Security and Privacy in the Intelligent Environment,' http://www.ai.mit.edu
- Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick and Helen Lowe, 'Dynamic Trust Models for Ubiquitous Computing Environments,' Proc. of Workshop on Security in Ubiquitous Computing, 2003
- Laurent Bussard and Yves Roudier, 'Authentication in Ubiquitous Computing,' Proc. of Workshop on Security in Ubiquitous Computing, 2003
- Frank Stajano, 'Security for Ubiquitous Computing,' Wiley, 2002
- Lalana Kagal, Tim Finin and Anupam Joshi, 'Moving from Security to Distributed Trust in Ubiquitous Computing Environments,' IEEE Computer, 2001
- Jean Bacon, Michael Looyd, and Ken Moody, 'Translating Role-Based Access Control Poly within Context,' Proc. of International Workshop, Policies for Distributed Systems and Networks, 2001
- Michael J. Covington, Wende Long, 'Securing Context-Aware Applications Using Environment Roles,' Proc. of Sixth ACM Symposium on Access Control Models and Technologies, 2001 https://doi.org/10.1145/373256.373258
- Arun Kumar, Neeran Karnik, an Girish Chafle, 'Context sensitivity in role-based access control,' ACM SIGOPS Operating Systems Review, 2002 https://doi.org/10.1145/567331.567336
- Charles P. Pfleeger and Shari L. Pfleeger, 'Security in Compting,' Prentice Hall, 3rd edition, 2003
- Matt Bishop, 'Computer Security,' Addison Wesley, 2003
- James B. D. Joshi, Elisa Bertino and Arif Ghafoor, 'Temporal Hierarchies and Inheritance Semantics for GTRBAC,' Proc. of 7th ACM Symposium on access Control Models and Technologies, 2002 https://doi.org/10.1145/507711.507724
- Ravi Sandhu, Venkata Bhamidipati and Qamar Munawer, 'The ARBAC97 Model for Role-Based Administration of Roles,' ACM Transactions on Information and System Security, 1999 https://doi.org/10.1145/300830.300839
- Sejong Oh, Ravi Sandhu, 'A Model of Role Administration Using Organization Structure,' Proc. of 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002), 2002
- Mark Evered, Serge Bogeholz, 'A case study in access control requirements for a Health Information System,' Proc. of the 2nd workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation, Vol.32, 2004
- S. A. Demurjian, T. C. Ting and M. Y. Hu, 'Role-Based Access Control for Object-Oriented/C + + Systems,' Proc. of first ACM Role-Based Access Control Workshop, 1995
- Yan Han, Liu Fengyu, and Zhang Hong, 'An Object-Oriented Model of Access Control based on Role,' ACM SIGSOFT Software Engineering Notes, Vol.25, No.2, 2000
- Gustaf Neumann and Mark Strembeck, 'Design and Implementation of a Flexible RBAC-Service in an Object-Oriented Scripting Language,' Proc. of the 8th ACM conference on Computer and Communications Security, 2001 https://doi.org/10.1145/501983.501992
- Mark Evered, 'Flexible Enterprise Access Control with Object-oriented View Specification,' Proc. of Australasian Information Security Workshop 2003 (AISW2003), 2003
- 이성국, 김완석, '세계 각국의 유비쿼터스 컴퓨팅 전략', 전자신문사, 2003
- 김완석, 김정국, 박범수, 박태웅, 이성국, '유비쿼터스 컴퓨팅 전략 및 정책', 한국디지털정책학회 창립학술대회 학술논문지, 2003