Sciweavers

1517 search results - page 20 / 304
» Time and Location Based Services with Access Control
Sort
View
CCS
2010
ACM
13 years 7 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
LCN
2007
IEEE
14 years 2 months ago
Investigation of IEEE 802.11k-based Access Point Coverage Area and Neighbor Discovery
— Possessing knowledge about access point coverage areas and neighbors is of essential need for the provisioning of, e.g., location based handovers or push services. A convenient...
Sven D. Hermann, Marc Emmelmann, O. Belaifa, Adam ...
ICDCSW
2003
IEEE
14 years 1 months ago
Using Service Brokers for Accessing Backend Servers for Web Applications
— Current Web servers use various API sets to access backend services. This model does not support service differentiation, overload control, caching of contents generated by bac...
Huamin Chen, Prasant Mohapatra
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
14 years 2 months ago
An Experimental Investigation of Location-Based Services
Whereas the conventional applications mostly assume stationary or fixed users, more and more emphasis is placed on mobility, the need for people to stay connected while moving aro...
Iris A. Junglas
SACMAT
2005
ACM
14 years 2 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang