ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
2
views
0
references
Top references
cited by
3
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,092
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Risk-based access control systems built on fuzzy inferences
Author(s):
Qun Ni
,
Elisa Bertino
,
Jorge Lobo
,
Q Ni
,
E Bertino
,
J. Lobo
Publication date:
2010
Journal:
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS '10
Read this article at
ScienceOpen
Publisher
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Big Data Privacy
Author and article information
Journal
DOI::
10.1145/1755688.1755719
ScienceOpen disciplines:
Computer science
,
Security & Cryptology
Data availability:
ScienceOpen disciplines:
Computer science
,
Security & Cryptology
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,092
Modern microprocessor built from complementary carbon nanotube transistors
Authors:
Gage Hills
,
Christian Lau
,
Andrew Wright
…
Healthy Cities of Tomorrow: the Case for Large Scale Built Environment-Health Studies.
Authors:
Chinmoy Sarkar
,
Chris Webster
Getting to Know a Place: Built Environment Walkability and Children’s Spatial Representation of Their Home-School (h–s) Route
Authors:
Mika R. Moran
,
Efrat Eizenberg
,
Pnina Plaut
See all similar
Cited by
3
A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems
Authors:
Donghee Choi
,
Dohoon Kim
,
Soo Seog Park
Implementing Access Control Markov Decision Processes with GLPK/GMPL
Authors:
Charles Morisset
Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities
Authors:
Vera Rimmer
,
Davy Preuveneers
,
Wouter Joosen
…
See all cited by