Modelling mobility in disaster area scenarios, Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems , MSWiM '07, pp.4-12, 2007. ,
DOI : 10.1145/1298126.1298131
Obligation monitoring in policy management, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, 2002. ,
DOI : 10.1109/POLICY.2002.1011288
Generative communication in Linda, ACM Transactions on Programming Languages and Systems, vol.7, issue.1, pp.80-112, 1985. ,
DOI : 10.1145/2363.2433
On the need for a third form of access control, 12th National Computing Security Conferece, pp.296-304, 1989. ,
XML document security based on provisional authorization, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000. ,
DOI : 10.1145/352600.352613
The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security, Proc. of Intl. Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks, 2006. ,
DOI : 10.1007/978-0-387-71058-7_5
Tuples on the air: a middleware for context-aware computing in dynamic networks, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings., p.342, 2003. ,
DOI : 10.1109/ICDCSW.2003.1203577
usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004. ,
DOI : 10.1145/984334.984339
LIME, Proceedings of the 21st international conference on Software engineering, ICSE '99, pp.368-377, 1999. ,
DOI : 10.1145/302405.302659
Solving the Linda multiple rd problem, Coordination Languages and Models, pp.357-367, 1996. ,
DOI : 10.1007/3-540-61052-9_56
Authorisation and Conflict Resolution for Hierarchical Domains, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), pp.201-210, 2007. ,
DOI : 10.1109/POLICY.2007.8
An opportunistic authority evaluation scheme for data security in crisis management scenarios, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010. ,
DOI : 10.1145/1755688.1755709
Coordinating Workflow Allocation and Execution in Mobile Environments, Proceeding of the 9th Int'l Conf. on Coordination Models and Languages, pp.249-267, 2007. ,
DOI : 10.1007/978-3-540-72794-1_14
Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, pp.76-83, 2009. ,
DOI : 10.1109/POLICY.2009.38
XrML -- eXtensible rights Markup Language, Proceedings of the 2002 ACM workshop on XML security , XMLSEC '02, pp.71-79, 2002. ,
DOI : 10.1145/764792.764803