Sciweavers

1927 search results - page 12 / 386
» An Access Control Model for Location based Services
Sort
View
DEBS
2008
ACM
13 years 9 months ago
Access control in publish/subscribe systems
Two convincing paradigms have emerged for achieving scalability in widely distributed systems: publish/subscribe communication and role-based, policy-driven control of access to t...
Jean Bacon, David M. Eyers, Jatinder Singh, Peter ...
DBSEC
2010
161views Database» more  DBSEC 2010»
13 years 9 months ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...
IPCCC
2007
IEEE
14 years 1 months ago
A Model-Based Admission Control for 802.11e EDCA using Delay Predictions
- This paper presents a unique approach for a model-based admission control algorithm for the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) standard. The analytical model...
A. Bai, Tor Skeie, Paal E. Engelstad
SACMAT
2004
ACM
14 years 29 days ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
SACMAT
2010
ACM
13 years 6 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino