Sciweavers

243 search results - page 1 / 49
» Location-Aware Authentication and Access Control
Sort
View
AINA
2009
IEEE
13 years 9 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
GIS
2008
ACM
14 years 5 months ago
A location aware role and attribute based access control system
In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of roles with users. In our framework, privileges assoc...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
MSWIM
2006
ACM
13 years 10 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
PERCOM
2006
ACM
14 years 4 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
HICSS
2002
IEEE
150views Biometrics» more  HICSS 2002»
13 years 9 months ago
An Architecture for Location Aware Applications
This paper presents an architecture for location aware applications, where positioning sources such as GPS, WaveLAN and Bluetooth devices can be seamlessly interchanged or even co...
James Nord, Kåre Synnes, Peter Parnes