This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features...
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Learning patterns of human behavior from sensor data is extremely important for high-level activity inference. We show how to extract and label a person’s activities and signiď¬...
The user profile is one of the main context-information in a wide range of pervasive computing applications. Modern handheld devices provided with localization capabilities could a...
This paper introduces a context-aware authorization architecture that is designed to augment existing network security protocols in an Intranet environment. It describes the archi...