Sciweavers

243 search results - page 20 / 49
» Location-Aware Authentication and Access Control
Sort
View
IEEEARES
2006
IEEE
14 years 1 months ago
Secure 3G User Authentication in Adhoc Serving Networks
The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a pr...
Arjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard...
IEEEARES
2010
IEEE
14 years 2 months ago
Solving the Transitive Access Problem for the Services Oriented Architecture
: © Solving the Transitive Access Problem for the Services Oriented Architecture Alan H. Karp, Jun Li HP Laboratories HPL-2008-204R1 SOA, web services, access control, RBAC, PBAC,...
Alan H. Karp, Jun Li
ESORICS
2012
Springer
11 years 10 months ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...
SACMAT
2003
ACM
14 years 28 days ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
CORR
2011
Springer
195views Education» more  CORR 2011»
13 years 2 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...