Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Bertino, Elisa, Piero Andrea Bonatti, and Elena Ferrari. "TRBAC: A temporal role-based access control model." ACM Transactions on Information and System Security (TISSEC) 4.3 (2001): 191-233.
    2. Chakraborty, Sudip, and Indrajit Ray. "TrustBAC: integrating trust relationships into the RBAC model for access control in open systems." Proceedings of the eleventh ACM symposium on Access control models and technologies. 2006.
    3. Chandran, Suroop Mohan, and James BD Joshi. "LoT-RBAC: a location and time-based RBAC model." International Conference on Web Information Systems Engineering. Springer, Berlin, Heidelberg, 2005.)
    4. Chen, Liang, and Jason Crampton. "On spatiotemporal constraints and inheritance in role based access control." Proceedings of the 2008 ACM symposium on Information, computer and communications security. 2008.
    5. Toahchoodee, Manachai, et al. "A trust-based access control model for pervasive computing applications." IFIP Annual Conference on Data and Applications Security and Privacy. Springer, Berlin, Heidelberg, 2009.
    6. A.M.Hema, Dr.K.Kuppusamy , "Trust based access control schemes for pervasive computing environment" , in Proc. of 2nd International Conference on Recent Trends In Information Technology (ICRTIT), 2012.IEEE Xplore ,Page 157-161.
    7. Ray, I., Ray, I., Chakraborty, S,” An Interoperable Context Sensitive Model of Trust.”, Journal of Intelligent Information Systems 32(1), 75–104 (2009)
    8. Ray, I., Toahchoodee, M.,” A Spatio-Temporal Access Control Model Supporting Delegation for Pervasive Computing Applications.”, In: Proceedings of the 5th International Conference on Trust, Privacy & Security in Digital Business, Turin, Italy (September 2008)
    9. Geepalla, Emsaieb, Behzad Bordbar, and Kozo Okano. "Verification of spatio-temporal role based access control using timed automata." 2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA). IEEE, 2012.
    10. Toahchoodee, M., Ray, I.: On the Formal Analysis of a Spatio-Temporal Role-Based Access Control Model. In: Atluri, V. (ed.) DAS 2008. LNCS, vol. 5094, pp. 17–32. Springer, Heidelberg (2008)
    11. Marsh, S.P, “Formalising Trust as a Computational Concepts” . Ph.D. Thesis , Ray, I., Kumar, M., Yu, L.,” LRBAC: A LocationAware Role-Based Access Control Model.”, In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol. 4332, pp. 147–161. Springer, Heidelberg (2006)
    12. University of Stirling (1994)
    13. Lamsal,P, “Requriements for modelling trust in ubiquitous computing and ad hoc networks”, Ad hoc mobile wireless netwoks- Research seminar on Telecommunications software(2002).
    14. Aime, M.D. and Lioy, “A.: Incremental trust: building trust from past experience.” In Proc. of IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, Italy (2005) 603-608
    15. Shand, B , Dimmock, N, Bacon , “J : Trust for Ubiquitous , Transaparent Collabration.” In Proc. of ACM: Special issue: Pervasive compurting and communications(2004) , 711-721.
    16. He, R. Niu, J.W, Yuan , “M : A novel CloudBased Trust model for pervasive computing .” In Proc. of the Fourth International Conference on Computer and Infromation Technology (2004) 693-700
    17. Pierre E. ABI-CHAR ‘A Dynamic Trust Based Context aware secure authentication framework for pervasive computing environment’, Ph.D. Dissertation , May 2010.

Recent Article