Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07) 2007
DOI: 10.1109/policy.2007.40
|View full text |Cite
|
Sign up to set email alerts
|

Proteus: A Semantic Context-Aware Adaptive Policy Model

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0
1

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(20 citation statements)
references
References 11 publications
0
19
0
1
Order By: Relevance
“…expressed using a descriptive language called PsSF, based on SWRL 26 . They distinguish only Read and Update actions.…”
Section: Context-unaware Access Control Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…expressed using a descriptive language called PsSF, based on SWRL 26 . They distinguish only Read and Update actions.…”
Section: Context-unaware Access Control Modelsmentioning
confidence: 99%
“…Toninelli et al [25,26] follow two design guidelines, which guide also the construction of the framework proposed in this paper: context-awareness to control resource access, and semantic technologies for context and policy specification. What differs from our approach is, on one hand, the application scenario, spontaneous coalitions in their case and the Social Semantic Web in our approach, and, on the other hand, the semantic technology adopted, i.e., a rulebased approach with description logic in their case and the SPARQL 1.1 language in our case.…”
Section: Context-aware Access Control Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Context-aware access control strategies fall in two main categories. The first category is the one of techniques aimed at granting or denying access to resources considering the context of the requesting user and of the resource (see, e.g., [19][20][21]). The second category is the one of techniques aimed at controlling the release of user's context data on the basis of the context of the requesting entity and of the user herself.…”
Section: Network and Cryptographic Protocolsmentioning
confidence: 99%
“…To improve the ways in which data is accessed and presented, the system is "policy-aware", allowing all data to be controlled by a set of (arbitrarily complex) context-adjusted policies [21], [22].…”
Section: A General Data Browsingmentioning
confidence: 99%