Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
Abstract. Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can...
Although numerous context-aware applications have been developed and there have been technological advances for acquiring contextual information, it is still difficult to develop a...
Anind K. Dey, Timothy Sohn, Sara Streng, Justin Ko...
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Abstract--1D or linear barcodes are the black-and-whitestriped codes that can be found on most consumer products. This work evaluates existing 1D barcode scanners for mobile phones...
Felix von Reischach, Stephan Karpischek, Florian M...