共 24 条
[1]
Abowd GD, 1999, LECT NOTES COMPUT SC, V1707, P304
[2]
[Anonymous], 2020, ERICSSON MOBILITY VI
[3]
[Anonymous], 1996, Health insurance Portability & Accountability Act
[5]
How to securely break into RBAC: the BTG-RBAC model
[J].
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE,
2009,
:23-+
[6]
Modular Context-Aware Access Control for Medical Sensor Networks
[J].
SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES,
2010,
:129-138
[7]
Gupta SKS, 2006, PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, P251
[8]
He WJ, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P255
[9]
An Autonomic Context Management System for Pervasive Computing
[J].
2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS,
2008,
:213-+