Author of the publication

Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems.

, , , , and . Mob. Networks Appl., 15 (2): 267-282 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Human movement detection using home network information and events on smartphones.. ICEIC, page 1-2. IEEE, (2014)Dynamic Role Assignment Using Semantic Contexts., , , and . AINA Workshops, page 1049-1054. IEEE Computer Society, (2009)Using semantic policies for ad-hoc coalition access control., , and . MobiQuitous, page 1-8. IEEE Computer Society, (2006)Managing Access Control for Presence-Based Services., , and . CNSR, page 105-111. IEEE Computer Society, (2005)Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems., , , , and . Mob. Networks Appl., 15 (2): 267-282 (2010)Session-Based Service Discovery and Access Control in Peer-to-Peer Communications., , , and . ADHOC-NOW, volume 3158 of Lecture Notes in Computer Science, page 225-237. Springer, (2004)Projecting Web services using presence communication protocols for pervasive computing., and . WiMob (4), page 98-103. IEEE, (2005)0-7803-9181-0.OLSR-based Topology Discovery for Mobile Situational Awareness Systems., , , and . ANT/MobiWIS, volume 5 of Procedia Computer Science, page 418-425. Elsevier, (2011)Discovering and Managing Access to Private Services in Collaborative Sessions., , , and . IEEE Trans. Syst. Man Cybern. Part A, 36 (6): 1086-1097 (2006)Network performance of a wireless sensor network for temperature monitoring in vineyards., , , , , , and . PE-WASUN, page 125-130. ACM, (2011)