Sciweavers

203 search results - page 11 / 41
» An Investigation Into Access Control For Mobile Devices
Sort
View
CN
2007
172views more  CN 2007»
13 years 7 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
HCI
2007
13 years 9 months ago
User Expectations from Dictation on Mobile Devices
Mobile phones, with their increasing processing power and memory, are enabling a diversity of tasks. The traditional text entry method using keypad is falling short in numerous way...
Santosh Basapur, Shuang Xu, Mark Ahlenius, Young S...
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 9 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
MOBISYS
2007
ACM
14 years 7 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
SOCO
2008
Springer
13 years 7 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot