We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
In this paper, we propose a toolkit, wear-UCAM, which can support mobile user interactions in smart environments through utilizing user's context. With the rapid developments ...
Dongpyo Hong, Youngjung Suh, Ahyoung Choi, Umar Ra...
This paper presents an energy-conservation method for multiple disks and their cache memory. Our method periodically resizes the cache memory and controls the rotation speeds unde...
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
This talk gives a personal perspective on the topic area of this new conference on data and application security and privacy, the difficult nature of the challenge we are confron...