Developing Ambient Intelligence 2008
DOI: 10.1007/978-2-287-78544-3_14
|View full text |Cite
|
Sign up to set email alerts
|

XACML as a Security and Dependability Pattern for Access Control in AmI environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…It is based on the design pattern MVC, which consists of three types of objects in which the Model is the schema of the application, the View is the screen of presentation, and the Controller defines the way the user input is processed. As it can be seen, it is a highly modular and decoupled [50], and could also be described as a design pattern, such as is presented in [51,52]. For management and control of the simulation scenarios, components that describe the core of the system are presented in Figure 1.…”
Section: Architecturementioning
confidence: 99%
“…It is based on the design pattern MVC, which consists of three types of objects in which the Model is the schema of the application, the View is the screen of presentation, and the Controller defines the way the user input is processed. As it can be seen, it is a highly modular and decoupled [50], and could also be described as a design pattern, such as is presented in [51,52]. For management and control of the simulation scenarios, components that describe the core of the system are presented in Figure 1.…”
Section: Architecturementioning
confidence: 99%
“…Due to this and other factors, usage of technologies designed to provide anonymity on the Internet has increased. There has been a rise in trusted platform modules to secure data as well (Munoz & Fernandez, 2020;Munoz et al, 2008;Lopez et al, 2006;Munoz & Mana, 2011). Other techniques include monitoring architectures for the cloud and secure agent computing (Munoz et al, 2013;Maña et al, 2007).…”
Section: Introductionmentioning
confidence: 99%
“…Due to this and other factors, usage of technologies designed to provide anonymity on the Internet has increased. There has been a rise in trusted platform modules to secure data as well (Ma et al, 2006;Munoz & Fernandez, 2020;Munoz & Mana, 2011;Munoz et al, 2008). Other techniques include monitoring architectures for the cloud and secure agent computing (Indulska et al, 2007;Munoz et al, 2013).…”
Section: Introductionmentioning
confidence: 99%