Sciweavers

1927 search results - page 6 / 386
» An Access Control Model for Location based Services
Sort
View
IJAHUC
2007
135views more  IJAHUC 2007»
13 years 7 months ago
Service Location Protocols for mobile wireless ad hoc networks
: As service-oriented networks are essential in our lives, service location, access and provisioning over wired or wireless networks govern users’ satisfaction. While they are we...
Chai-Keong Toh, Guillermo Guichal, Dongkyun Kim, V...
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 9 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
CCS
2010
ACM
13 years 6 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
TON
2010
157views more  TON 2010»
13 years 2 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle
PERCOM
2006
ACM
14 years 7 months ago
Avoiding privacy violations caused by context-sensitive services
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...
Urs Hengartner, Peter Steenkiste