Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,276,776 papers from all fields of science
Search
Sign In
Create Free Account
Context-based access control
Known as:
CBAC
Context-based access control (CBAC) is a feature of firewall software which intelligently filters TCP and UDP packets based on application layer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Broader (3)
Access control
Computer access control
Data security
Access control list
Capability-based security
Computer security model
Deep packet inspection
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Context Delegation for Context-Based Access Control
M. Al-Wahah
,
C. Farkas
Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML
2018
Corpus ID: 67750602
The capability to delegate access privileges is an essential component of access control policies. We present an ontology-based…
Expand
Review
2015
Review
2015
On the Security and Privacy of Internet of Things Architectures and Systems
Emmanouil Vasilomanolakis
,
Jörg Daubert
,
Manisha Luthra
,
E. Gazis
,
A. Wiesmaier
,
Panayotis Kikiras
International Workshop on Secure Internet of…
2015
Corpus ID: 1898852
The Internet of Things (IoT) brings together a multitude of technologies, with a vision of creating an interconnected world. This…
Expand
Highly Cited
2015
Highly Cited
2015
Context-Based Access Control Systems for Mobile Devices
Bilal Shebaro
,
Oyindamola Oluwatimi
,
E. Bertino
IEEE Transactions on Dependable and Secure…
2015
Corpus ID: 479319
Mobile Android applications often have access to sensitive data and resources on the user device. Misuse of this data by…
Expand
2013
2013
Context-based access control for ridesharing service
N. Teslya
,
A. Kashevnik
,
M. Pashkin
14th Conference of Open Innovation Association…
2013
Corpus ID: 7436102
The paper describes a context-based access control model for a ridesharing service. Ridesharing is a shared use of a car by the…
Expand
2009
2009
A generalized context-based access control model for pervasive environments
José Bringel Filho
,
H. Martin
International Workshop on Security and Privacy in…
2009
Corpus ID: 13364939
Pervasive Computing Environments enable new opportunities for users to share and to access resources anytime and anywhere in a…
Expand
2007
2007
Contexts and Context-Based Access Control
E. Fernández
,
M. Larrondo-Petrie
,
A.E. Escobar
International Conference on Wireless and Mobile…
2007
Corpus ID: 21044732
The increasing diffusion of portable devices and the widespread availability of wireless networks where users live, work and…
Expand
2005
2005
Context-based access control
J. Rubart
Workshop on Multimedia Information Systems
2005
Corpus ID: 17418298
Various use cases require flexible and dynamic access control management. This paper proposes security contexts and affinities…
Expand
Highly Cited
2004
Highly Cited
2004
Context-based access control management in ubiquitous environments
Antonio Corradi
,
R. Montanari
,
Daniela Tibaldi
Third IEEE International Symposium on Network…
2004
Corpus ID: 9723535
Wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning…
Expand
Highly Cited
2004
Highly Cited
2004
Context-based access control for ubiquitous service provisioning
Antonio Corradi
,
R. Montanari
,
Daniela Tibaldi
Proceedings of the 28th Annual International…
2004
Corpus ID: 15228250
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for…
Expand
Highly Cited
1987
Highly Cited
1987
THE RELATIONSHIP BETWEEN DRIVERS' BLOOD ALCOHOL CONCENTRATION CBAC) AND ACTUAL DRIVING PERFORMANCE DURING HIGH SPEED TRAVEL.
Jan Uillem Louuerens
1987
Corpus ID: 26827344
INTRODUCTION The disabling influence of alcohol-use on daily life functions has always been as notorious as its allurement. Yet…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE