Sciweavers

548 search results - page 5 / 110
» An authorization and access control scheme for pervasive com...
Sort
View
HOTOS
2003
IEEE
14 years 8 days ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste
PERCOM
2007
ACM
14 years 6 months ago
Distributed, Uncertainty-Aware Access Control for Pervasive Computing
Access control to sensitive resources in pervasive computing needs to take uncertainty into account. Previous research has developed uncertainty-aware access-control models for en...
Urs Hengartner, Ge Zhong
PERCOM
2006
ACM
14 years 6 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
PST
2008
13 years 8 months ago
An Access Control Scheme for Protecting Personal Data
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
Wilfred Villegas, Bader Ali, Muthucumaru Maheswara...
HASE
2007
IEEE
14 years 1 months ago
Flexible Authorization with Decentralized Access Control Model for Grid Computing
Xinwen Zhang, Qi Li, Jean-Pierre Seifert, Mingwei ...