Michael J. Covington

According to our database1, Michael J. Covington authored at least 16 papers between 2001 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Threat implications of the Internet of Things.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

2011
Patient-centric authorization framework for electronic healthcare services.
Comput. Secur., 2011

2010
SocialVPN: Enabling wide-area collaboration with integrated social and overlay networks.
Comput. Networks, 2010

On map matching of wireless positioning data: a selective look-ahead approach.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010

2009
Patient-centric authorization framework for sharing electronic health records.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

2008
Toward a Usage-Based Security Framework for Collaborative Computing Systems.
ACM Trans. Inf. Syst. Secur., 2008

Access Control Model for Sharing Composite Electronic Health Records.
Proceedings of the Collaborative Computing: Networking, 2008

2007
SecureBus: towards application-transparent trusted computing with mandatory access control.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Client-side access control enforcement using trusted computing and PEI models.
J. High Speed Networks, 2006

Attribute-Based Authentication Model for Dynamic Mobile Environments.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

A usage-based authorization framework for collaborative computing systems.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

A Contextual Attribute-Based Access Control Model.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Securing Collaborative Applications.
Proceedings of the 2006 International Conference on Security & Management, 2006

2004
Parameterized Authentication.
Proceedings of the Computer Security, 2004

2002
A Context-Aware Security Architecture for Emerging Applications.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Securing context-aware applications using environment roles.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001


  Loading...