Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...
One fundamental task to realize the envisioned ubiquitous computing paradigm is the proper management of the data generated in this environment. The special characteristics of high...
The first challenge that we tackle in this paper is how to conduct access control in ubiquitous environments where sites have to handle access requests from their own users as wel...
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Distributed Role-Based Access Control (dRBAC) is a scalable, decentralized trust-management and accesscontrol mechanism for systems that span multiple administrative domains. dRBA...
Eric Freudenthal, Tracy Pesin, Lawrence Port, Edwa...