2009
DOI: 10.1007/978-3-642-01802-2_18
|View full text |Cite
|
Sign up to set email alerts
|

A Quality of Context-Aware Approach to Access Control in Pervasive Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0
1

Year Published

2012
2012
2014
2014

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(22 citation statements)
references
References 11 publications
0
21
0
1
Order By: Relevance
“…Intel Xeon E5540, Quad Core 2.53 GHz machine with 48 GB of memory, using the Berlin SPARQL Benchmark (BSBM) dataset 3.1 24 .…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Intel Xeon E5540, Quad Core 2.53 GHz machine with 48 GB of memory, using the Berlin SPARQL Benchmark (BSBM) dataset 3.1 24 .…”
Section: Discussionmentioning
confidence: 99%
“…At the same time, also the other contextual information like the time of the query or the location of the consumer when she is querying the SPARQL endpoint have to be checked. We plan to follow the example of Toninelli et al [24].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Among the approaches to context models found in the literature, some of the authors used QoC. These authors emphasized models that use graphical notation (Henricksen, Indulska, & Rakotonirainy, 2002); (Filho & Martin, 2008), XML (Extensible Markup Language) (Manzoor et al, 2008), UML (Unified Modelling Language) (Neisse, Wegdam, & Sinderen, 2008) and especially the use of ontologies and OWL (Ontology Web Language) (Tang, Yang, & Wu, 2007), (Toninelli & Corradi, 2009), (Filho et al, 2010). The use of ontologies for modeling context and QoC allows for reuse and sharing of context information.…”
Section: Context Representation Models With Qocmentioning
confidence: 99%
“…In a total of twenty-one papers, some other specific topics were highlighted, such as: resolution of conflicts and inconsistencies (Becker et al, 2010), (Xu, Ma, & Cao, 2012), (Zheng, Wang, & Ben, 2012); some aspects related to security (access control, privacy, reliability) (Filho & Martin, 2008), (Neisse et al, 2008), (Toninelli & Corradi, 2009); distribution of context data (Corradi et al, 2010), (Bellavista et al, 2012); and agent and multi-agent approaches (Zheng et al, 2012). Exploring each of these topics would certainly pose many challenges to be investigated.…”
Section: Other Topicsmentioning
confidence: 99%