Generalized Role-Based Access Control for Securing Future Applications, 23rd National Information Systems Security Conference, pp.16-19, 2000. ,
A Policy Based Context-aware Service for Next Generation Networks, 8th London Communication Symposium, 2003. ,
Context sensitivity in role-based access control, ACM SIGOPS Operating Systems Review, vol.36, issue.3, pp.53-66, 2002. ,
DOI : 10.1145/567331.567336
A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments, International Semantic Web Conference, pp.473-486, 2006. ,
DOI : 10.1007/11926078_34
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach, MMM-ACNS 2003, pp.267-278, 2003. ,
DOI : 10.1007/978-3-540-45215-7_22
Towards Context-aware Security: An Authorization Architecture for Intranet Environments. PerCom Workshops, pp.132-137, 2004. ,
Using context and similarity for face and location identification, Internet Imaging VII, 2006. ,
DOI : 10.1117/12.650981
Context-aware multimedia computing in the intelligent hospital, Proceedings of the 9th workshop on ACM SIGOPS European workshop beyond the PC: new challenges for the operating system, EW 9, pp.13-18, 2000. ,
DOI : 10.1145/566726.566730
Induction of Decision Trees -Machine Learning, 1986. ,
Logic, Knowledge Representation, and Bayesian Decision Theory. Computational Logic, pp.70-86, 2000. ,
DOI : 10.1007/3-540-44957-4_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.3241
A Mathematical Theory of Evidence, 1976. ,
A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications, Human-Computer Interaction, vol.37, issue.3, pp.97-166, 2001. ,
DOI : 10.1109/98.626982
Hybrid Approach to Collaborative Context- Aware Service Platform for Pervasive Computing, Journal of Computers (JCP), pp.40-50, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-01500590
Ontology Based Context Modeling and Reasoning using OWL. PerCom Workshops, p.IEEE, 2004. ,
A Trust-Based Context-Aware Access Control Model for Web-Services. Distributed and Parallel Databases, pp.83-105, 2005. ,
A Dynamic, Context-Aware Security Infrastructure for Distributed Healthcare Applications. 5th Workshop on Pervasive Security Privacy and Trust (PSPT), 2004. ,
A context-aware security architecture for emerging applications, 18th Annual Computer Security Applications Conference, 2002. Proceedings., pp.249-260, 2002. ,
DOI : 10.1109/CSAC.2002.1176296
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.7335
Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.10-20, 2001. ,
DOI : 10.1145/373256.373258
Supporting location-based conditions in access control policies, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, pp.212-222, 2006. ,
DOI : 10.1145/1128817.1128850
Community Development of Java Technology Specifications, p.135, 2008. ,
C4.5: programs for machine learning, 1993. ,
Colour Object recognition combining Motion Descriptors, Zernike Moments and Support Vector Machine, IECON 2006, 32nd Annual Conference on IEEE Industrial Electronics, pp.3238-3242, 2006. ,
DOI : 10.1109/IECON.2006.347588
A Generalization of Bayesian Inference, Journal of Royal Statistical, pp.205-447, 1968. ,
DOI : 10.1007/978-3-540-44792-4_4
Privacy intrusion detection using dynamic Bayesian networks. 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet, pp.208-215, 2006. ,
DOI : 10.1145/1151454.1151493
A Framework for an Adaptive Intrusion Detection System using Bayesian Network. ISI, Computer Science, pp.66-70, 2007. ,
Bayesian Networks for Knowledge-Based Authentication, IEEE Transactions on Knowledge and Data Engineering, vol.19, issue.5, pp.695-710, 2007. ,
DOI : 10.1109/TKDE.2007.1024
Induction of fuzzy decision trees, Fuzzy Sets and Systems, vol.69, issue.2, 1995. ,
DOI : 10.1016/0165-0114(94)00229-Z