Sender anonymity in location-based services (LBS) attempts to hide the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. &...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Coping with mobility and dynamism is one of the biggest challenges in ad hoc networks. An essential requirement for such networks is a service that can establish communication ses...
We consider the problem of location management of mobile users. The objective is to keep track of the mobile users in order to deliver calls. The IS-41 is a simple strategy for loc...
In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of roles with users. In our framework, privileges assoc...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...