Current ubiquitous computing environments provide many kinds of information. This information may be accessed by different users under varying conditions depending on various conte...
Innovative paradigms and frameworks have to be identified to enable the effective deployment and execution of pervasive computing services. Such frameworks must be conceived so a...
Cynthia Villalba, Alberto Rosi, Mirko Viroli, Fran...
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
—Current access control schemes focus on the user and their rights and privileges relating to the access to both initiating functionality and accessing information. This approach...