Sciweavers

708 search results - page 44 / 142
» Implementing access control to people location information
Sort
View
DBSEC
2007
87views Database» more  DBSEC 2007»
13 years 9 months ago
Towards a Times-Based Usage Control Model
Abstract. Modern information systems require temporal and privilegeconsuming usage of digital objects. To meet these requirements, we present a new access control model–Times-bas...
Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaoli...
TIME
2005
IEEE
14 years 1 months ago
A Trace Semantics for Positive Core XPath
— We provide a novel trace semantics for positive core XPath that exposes all intermediate nodes visited by the query engine. This enables a detailed analysis of all information ...
Pieter H. Hartel
ICWN
2003
13 years 9 months ago
Providing Secondary Access in a Cellular Network
— Most wireless systems receive a license that gives them exclusive access to a block of spectrum. Exclusivity guarantees adequate quality of service, but it also leads to inefï¬...
Sooksan Panichpapiboon, Jon M. Peha
CHI
2008
ACM
14 years 8 months ago
Accountabilities of presence: reframing location-based systems
How do mobility and presence feature as aspects of social life? Using a case study of paroled offenders tracked via Global Positioning System (GPS), we explore the ways that locat...
Emily Troshynski, Charlotte P. Lee, Paul Dourish
ACSW
2003
13 years 9 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean