Sciweavers

139 search results - page 1 / 28
» Exploiting information relationships for access control in p...
Sort
View
PERCOM
2006
ACM
14 years 4 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
PERCOM
2005
ACM
14 years 4 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
HOTOS
2003
IEEE
13 years 9 months ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste
ICDIM
2007
IEEE
13 years 8 months ago
Exploiting contextual handover information for versatile services in NGN environments
Users in ubiquitous and pervasive computing environments will be much more empowered in ways to access and to control their navigation. Handover, the vital event in which a user c...
Edson dos Santos Moreira, David N. Cottingham, Jon...
DBSEC
2007
138views Database» more  DBSEC 2007»
13 years 6 months ago
A Spatio-temporal Role-Based Access Control Model
With the growing advancement of pervasive computing technologies, we are moving towards an era where spatio-temporal information will be necessary for access control. The use of su...
Indrakshi Ray, Manachai Toahchoodee