Sciweavers

145 search results - page 3 / 29
» Privacy enhanced access control in pervasive computing envir...
Sort
View
HOTOS
2003
IEEE
13 years 10 months ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste
ISI
2006
Springer
13 years 5 months ago
A Flexible and Scalable Access Control for Ubiquitous Computing Environments
Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungy...
ACSW
2003
13 years 6 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
AINA
2007
IEEE
13 years 11 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang
IASTEDSE
2004
13 years 6 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis