In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Users in ubiquitous and pervasive computing environments will be much more empowered in ways to access and to control their navigation. Handover, the vital event in which a user c...
Edson dos Santos Moreira, David N. Cottingham, Jon...
Context-aware service platforms need to establish and manage trust relationships for users to know if the user's privacy policies are being enforced and for service providers ...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Context has the potential to enhance Web services in mobile environments to a great extent. Yet, challenges such as bandwidth restriction or dynamic changes require considerations ...