참고문헌
- 커뮤니티 컴퓨팅-위키백과, http://ko. wikipedia.org/wiki/커뮤니티-컴퓨팅
- L. Pareschi, D. Riboni, A. Agostini and C. Bettini, 'Composition and Generalization of Context Data for Privacy Preservation', In Proc. of 6th IEEE International Conference on Pervasive Computing and Communications (PerCom), Mar, 2008, Hong Kong https://doi.org/10.1109/PERCOM.2008.47
- S. Jajodia, R. and S. Sandhu, 'Toward a multilevel secure relational data model', In ACM SIGMOD Record, Vol. 20, No.2, pp. 50-59, Jun., 1991 https://doi.org/10.1145/119995.115796
- E. Bertino and E. Ferrari, 'Secure and selective dissemination of XML documents', In Transactions on Information and System Security (TISSEC), Vol. 5 No.3, Aug., 2002 https://doi.org/10.1145/545186.545190
- P. Reddivari et al., 'Policy based Access Control for a RDF Store', In Proc. of the Policy Management for the Web Workshop, May, 2005
- A. Jain and C. Farkas, 'Secure resource description framework: an access control model', In Proc. of ACM symposium on Access control models and technologies(SACMAT '06), pp 121-129, 2006, Lake Tahoe, California, USA https://doi.org/10.1145/1133058.1133076
- http://www. w3.org/TR/rdf-mt/#RDFSRules
- L. Qin and V. Atluri, "Concept-level access control for the Semantic Web", In Proc. of ACM workshop on XMLsecurity (XMLSEC '03), 2003 https://doi.org/10.1145/968559.968575
- U. Hengartner and P. Steenkiste, 'Access Control to Information in Pervasive Computing Environments', In Proc. of HotOS, 2003
- L. Kagal, T. Finin and A. Joshi, 'A policy language for a pervasive computing environment', In Proc. of IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003 https://doi.org/10.1109/POLICY.2003.1206958
- H. Chen, F. Perich, T. Finin and A. Joshi, 'SOUPA: standard ontology for ubiquitous and pervasive applications', In Proc. of Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITDUS), Aug., 2004 https://doi.org/10.1109/MOBIQ.2004.1331732
- D. Kulkarni and A. Tripath, 'Context-Aware Rolebased Access Control in Pervasive Computing Systems', SACMAT '08, June 11-13, 2008, Colorado, USA https://doi.org/10.1145/1377836.1377854
- P. Nasirifard, 'Context-Aware Access Control for Collaborative Working Environments Based on Semantic Social Networks', In Proc. of International and Interdisciplinary Conference on Modeling and Using Context (CONTEXT'07), Roskilde, Denmark, 2007
- A. Samuel, A. Ghafoor and E. Bertino, 'ContextAware Adaptation of Access-Control Policies', IEEE Internet Computing, Vol. 12, No.1, 2008 https://doi.org/10.1109/MIC.2008.6
- A. Toninelli, R. Montanari, L. Kagal and O. Lassila, 'A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments', In Proc. of International Semantic Web Conference, 2006 https://doi.org/10.1007/11926078_34
- U. Hengartner and G. Zhong, 'Distributed, Uncertainty- Aware access Control for Pervasive Computing', In Proc. of IEEE PerComW i '07, 2007 https://doi.org/10.1109/PERCOMW.2007.39
- R.J. Hulsebosch et. aI, 'Context Sensitive Access Control', In Proc. of SACMAT '05, June, 2005, Stockholm, Sweden
- E. Snekkenes, 'Concepts for personal location privacy policies', In Proc. of the 3rd ACM conference on Electronic Commerce, PP. 48-57, 2001 https://doi.org/10.1145/501158.501164
- GeoPriv Location/Privacy (geopriv), http://www.ietf.org/html. charters/ geopriv-charter. html
- L. Cranor, M. Langheinrich and M. Marchiori, 'A P3P preference exchange language 1.0 (APPEL1. 0), April 2002, http://www.w3.org/TR/P3P-preferences
- E.-S. Cho, K,-W. Lee and M. Hong, 'Abstraction for Privacy in Context-Aware Environments', MATA-05, 2005
- F. L. Gandon and N. M. Sadeh. 'A Semantic e-Wallet to Reconcile Privacy and Context Awareness.' In Proc. of International Semantic Web Conference (ISWC2003), pp. 385-401, 2003, Sanivel Island, Florida, USA
- R. Wishart, K. Henricksen and J. Indulska, 'Context obfuscation for privacy via ontological descriptions' In Proc. of Workshop on Location and ContextAwareness (LoCA), 2005 https://doi.org/10.1007/11426646_26
- L. Pareschi, D. Riboni and C. Bettini, 'Protecting Users' Anonymity', In Proc. of Pervasive Computing Environments (PerCom), 2008 https://doi.org/10.1109/PERCOM.2008.58
- Grusteser et. aI, 'Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking', In Proc. of Mobisys 2003 https://doi.org/10.1145/1066116.1189037
- B. Gedik and L. Liu. 'A Customizable k-Anonymity Model for Protecting Location Privacy', In Proc. of IEEE ICDCS, 2005