We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attribute...
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computin...
Users in ubiquitous and pervasive computing environments will be much more empowered in ways to access and to control their navigation. Handover, the vital event in which a user c...
Edson dos Santos Moreira, David N. Cottingham, Jon...
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
The University of Washington’s Classroom Presenter lecturing system enables an active lecturing environment by combining a standard electronic slide presentation format with the...
Michelle Wilkerson, William G. Griswold, Beth Simo...