Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A policy description language for context-based access control and adaptation in ubiquitous environment

Full metadata record
DC Field Value Language
dc.contributor.authorAhn, Joonseon-
dc.contributor.authorChang, Byeong-Mo-
dc.contributor.authorDoh, Kyung-Goo-
dc.date.accessioned2021-06-23T22:39:20Z-
dc.date.available2021-06-23T22:39:20Z-
dc.date.created2021-02-01-
dc.date.issued2006-08-
dc.identifier.issn0302-9743-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/45374-
dc.description.abstractThe goal of our research is to provide an advanced programming environment for ubiquitous computing, which facilitates the development of secure and reliable ubiquitous software. The environment consists of a high-level ubiquitous programming framework, a run-time system enhanced with better context adaptation and security, and programming support tools. In this paper, we focus on a ubiquitous programming framework, which includes a high-level policy description language, a translator to Java and a runtime system. We first present a high-level policy description language for formally specifying context entity relation, as well as context-based access control and adaptation policies. We then describe how a specification in the policy description language can be translated into Java code which makes use of JCAF.-
dc.language영어-
dc.language.isoen-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.titleA policy description language for context-based access control and adaptation in ubiquitous environment-
dc.typeArticle-
dc.contributor.affiliatedAuthorDoh, Kyung-Goo-
dc.identifier.doi10.1007/11807964_66-
dc.identifier.scopusid2-s2.0-33749423808-
dc.identifier.wosid000240081000066-
dc.identifier.bibliographicCitationEMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, v.4097, pp.650 - 659-
dc.relation.isPartOfEMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING-
dc.citation.titleEMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING-
dc.citation.volume4097-
dc.citation.startPage650-
dc.citation.endPage659-
dc.type.rimsART-
dc.type.docTypeArticle; Proceedings Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.identifier.urlhttps://link.springer.com/chapter/10.1007/11807964_66-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > SCHOOL OF COMPUTER SCIENCE > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE