Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007. ,
DOI : 10.1109/SP.2007.11
Information Flow in Disaster Management Systems, 2010 International Conference on Availability, Reliability and Security, 2010. ,
DOI : 10.1109/ARES.2010.107
Extending access control models with break-glass, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.197-206, 2009. ,
DOI : 10.1145/1542207.1542239
How to Break Access Control in a Controlled Manner, 19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06), pp.847-854, 2006. ,
DOI : 10.1109/CBMS.2006.95
Securing medical records on smart phones, Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems, SPIMACS '09, pp.31-40, 2009. ,
DOI : 10.1145/1655084.1655090
Handbook of Information Security, IBE (Identity-Based Encryption), pp.575-592, 2006. ,
ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks, Ad Hoc Networks, vol.7, issue.8, pp.1526-1535, 2009. ,
DOI : 10.1016/j.adhoc.2009.04.011
Complexity, structured chaos and the importance of information management for mobile computing in the uk floods of, pp.1-11, 2007. ,
Information and Communication Systems for Mobile Emergency Response, Information Systems and e-Business Technologies (uniscon), LNBIP, pp.213-224, 2008. ,
DOI : 10.1007/978-3-540-78942-0_22
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture, International Conference on Trusted Computing (Trust), pp.133-152, 2009. ,
DOI : 10.1016/S1389-1286(98)00019-X
Mobile Information Technology for Emergency Response, MobileResponse), 2009. ,
Secure attribute-based systems, ACM conference on Computer and communications security (ccs), pp.99-112, 2006. ,
DOI : 10.3233/jcs-2009-0383
URL : http://doi.org/10.3233/jcs-2009-0383
Fuzzy Identity-Based Encryption, International Conference on the Theory and Applications of Cryptographic Techniques (eurocrypt), pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
Securing First Response Coordination with Dynamic Attribute-Based Encryption, 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, pp.58-69, 2009. ,
DOI : 10.1109/CONGRESS.2009.11
fdac: Toward fine-grained distributed data access control in wireless sensor networks, IEEE Conference on Computer Communications (infocom, 2009. ,