—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Pervasive computing provides an attractive vision for the future of computing. Mobile computing devices such as mobile phones together with a land-based and wireless communication ...
We investigate the use of a thin-client based configuration in providing students with universal access to a centralized, graphical computing environment. The primary goal is to ...
Role-based access control (RBAC) has been proven to be a flexible and useful access control model for information sharing in distributed collaborative environments. Permission-rol...
Large public displays have become a regular conceptual element in many shops and businesses, where they advertise products or highlight upcoming events. In our work, we are interes...
Florian Alt, Nemanja Memarovic, Ivan Elhart, Domin...