Sciweavers

579 search results - page 72 / 116
» Access control management for ubiquitous computing
Sort
View
ECOOPW
2003
Springer
14 years 1 months ago
Advancing the State of the Art in Run-Time Inspection
levels of abstraction. Lacking well-established technologies and models for representing and accessing program dynamics, tools must use ad-hoc mechanisms. This limits reuse and int...
Robert E. Filman, Katharina Mehner, Michael Haupt
PERCOM
2010
ACM
13 years 6 months ago
A 3-layer architecture for smart environment models
— Enriched with more and more intelligent devices modern homes rapidly transform into smart environments. Their growing capabilities enable the implementation of a new generation...
Grzegorz Lehmann, Andreas Rieger, Marco Blumendorf...
SACMAT
2009
ACM
14 years 16 days ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
OTM
2007
Springer
14 years 2 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
CCS
2008
ACM
13 years 10 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...