Sciweavers

708 search results - page 1 / 142
» Implementing access control to people location information
Sort
View
SACMAT
2004
ACM
13 years 9 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
HOTOS
2003
IEEE
13 years 9 months ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste
PVLDB
2008
132views more  PVLDB 2008»
13 years 3 months ago
Access control over uncertain data
Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, p...
Vibhor Rastogi, Dan Suciu, Evan Welbourne
AVI
2006
13 years 5 months ago
Improving access of elderly people to real environments: a semantic based approach
Access to real environments is often conditioned by a number of issues, including the skills of the user (i.e. affected by aging, physical and psychological deficiencies, etc.) an...
Fabio Pittarello, Alessandro De Faveri
PERCOM
2006
ACM
14 years 3 months ago
Avoiding privacy violations caused by context-sensitive services
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...
Urs Hengartner, Peter Steenkiste