Sciweavers

579 search results - page 43 / 116
» Access control management for ubiquitous computing
Sort
View
SACMAT
2010
ACM
13 years 6 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
POLICY
2005
Springer
14 years 1 months ago
Relationship-Driven Policy Engineering for Autonomic Organisations
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based go...
Kevin Feeney, Karl Quinn, David Lewis, Declan O'Su...
SASO
2008
IEEE
14 years 2 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
SCANGIS
2001
13 years 9 months ago
Location-based services: A database perspective
We are heading rapidly towards a global computing and information infrastructure that will contain billions of wirelessly connected devices, many of which will offer so-called loca...
Christian S. Jensen, Anders Friis-Christensen, Tor...
MOBICOM
2004
ACM
14 years 1 months ago
Towards service and user discovery on wireless networks
This work presents a user position management system for Wi-Fi networks. The location system is based on access point coverage range and beacon devices. The implementation was mad...
Andrei Oliveira da Silva, Paulo Henrique de Souza ...