Cited By
View all- Kumar AAbhishek KChakraborty CRodrigues J(2022)Real geo‐time‐based secured access computation model for e‐Health systemsComputational Intelligence10.1111/coin.1252339:1(18-35)Online publication date: 10-Apr-2022
- Cleeff APieters WWieringa R(2010)Benefits of Location-Based Access ControlProceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing10.1109/GreenCom-CPSCom.2010.148(739-746)Online publication date: 18-Dec-2010
- Stieghahn MEngel T(2009)Law-aware access controlProceedings of the 2009 international conference on New frontiers in artificial intelligence10.5555/1881958.1881966(73-86)Online publication date: 19-Nov-2009
- Show More Cited By