Users in ubiquitous and pervasive computing environments will be much more empowered in ways to access and to control their navigation. Handover, the vital event in which a user c...
Edson dos Santos Moreira, David N. Cottingham, Jon...
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
—Software license management allows independent software vendors (ISVs) to control the access of their products. It is a fundamental part of the ISVs’ business strategy. A wide...