The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
Abstract. Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy...
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...