Sciweavers

139 search results - page 2 / 28
» Exploiting information relationships for access control in p...
Sort
View
FGCS
2008
159views more  FGCS 2008»
13 years 4 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
IASTEDSE
2004
13 years 6 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 6 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
PERCOM
2005
ACM
14 years 4 months ago
PICASSO: Pervasive Information Chronicling, Access, Search, and Sharing for Organizations
Several researchers have pointed out and begun to demonstrate that it is now possible to digitize an entire lifetime of experiences into a pocket-sized storage device, and thus to...
Gopal Pingali, Mark Podlaseck, Sinem Güven
SPC
2005
Springer
13 years 10 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...