Sensor networks are often used to sense the physical world and provide observations for various uses. In hostile environments, it is critical to control the network access to ensur...
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects...
Francis B. Afinidad, Timothy E. Levin, Cynthia E. ...
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
The importance of computer security in order to maintain the confidentiality, integrity and availability of data and information is well known. Different mechanisms have been propo...
Pervasive computing environments have traditionally used distributed sensors to gather user context. EPC (Electronic Product Code) information extracted from RFID tags could addit...