Hospital work is characterized by the need to manage multiple activities simultaneously, constant local mobility, frequently interruptions, and intense collaboration and communica...
Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo ...
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
With the growing advancement of pervasive computing technologies, we are moving towards an era where spatio-temporal information will be necessary for access control. The use of su...
This work on cognitive radio access ventures beyond the more traditional “listen-before-talk” paradigm that underlies many cognitive radio access proposals. We exploit the bi-...
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...