Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, p...
Access to real environments is often conditioned by a number of issues, including the skills of the user (i.e. affected by aging, physical and psychological deficiencies, etc.) an...
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...