Sciweavers

589 search results - page 100 / 118
» Evaluating mobile phones as risk information providers
Sort
View
PERVASIVE
2010
Springer
13 years 6 months ago
LOC8: A Location Model and Extensible Framework for Programming with Location
ing model abstracts over various types of positioning systems and incorporates the capture of uncertainty, serving as a foundation on which developers can apply sensor-fusion techn...
Graeme Stevenson, Juan Ye, Simon Dobson, Paddy Nix...
SACMAT
2009
ACM
14 years 2 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
LOCA
2009
Springer
14 years 2 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima
CCS
2010
ACM
13 years 6 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
ICEIS
2006
IEEE
14 years 1 months ago
Handheld Tools for Personalized and Proactive Psychotherapy
This paper presents a set of components that support psychotherapy processes on mobile and office settings. One provides patients the required access to psychotherapy artefacts, en...
Luís Carriço, Marco de Sá, Pe...