Sciweavers

1073 search results - page 116 / 215
» Secure context-sensitive authorization
Sort
View
CCS
2007
ACM
15 years 8 months ago
Extended privilege inheritance in RBAC
In existing RBAC literature, administrative privileges are inherited just like ordinary user privileges. We argue that from a security viewpoint this is too restrictive, and we be...
M. A. C. Dekker, J. G. Cederquist, Jason Crampton,...
141
Voted
NBIS
2007
Springer
15 years 8 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
EUROPAR
2005
Springer
15 years 8 months ago
On AAA Based on Brokers and Pre-encrypted Keys in MIPv6
For providing mobility services for users through the global Internet, Mobile IP (MIP) has been standardized by IETF. Since conventional MIP has been investigated without the suppo...
Hoseong Jeon, Min Young Chung, Hyunseung Choo
94
Voted
ICCSA
2005
Springer
15 years 8 months ago
On AAA with Extended IDK in Mobile IP Networks
Mobile IP proposed by IETF supports continuous services for a mobile node (MN) based on its capability to roam around foreign domains [1]. Recently the rapid growth of wireless tec...
Hoseong Jeon, Min Young Chung, Hyunseung Choo
115
Voted
CCS
2008
ACM
15 years 4 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton