Sciweavers

1927 search results - page 12 / 386
» An Access Control Model for Location based Services
Sort
View
DEBS
2008
ACM
14 years 11 months ago
Access control in publish/subscribe systems
Two convincing paradigms have emerged for achieving scalability in widely distributed systems: publish/subscribe communication and role-based, policy-driven control of access to t...
Jean Bacon, David M. Eyers, Jatinder Singh, Peter ...
DBSEC
2010
161views Database» more  DBSEC 2010»
14 years 11 months ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...
IPCCC
2007
IEEE
15 years 4 months ago
A Model-Based Admission Control for 802.11e EDCA using Delay Predictions
- This paper presents a unique approach for a model-based admission control algorithm for the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) standard. The analytical model...
A. Bai, Tor Skeie, Paal E. Engelstad
SACMAT
2004
ACM
15 years 3 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
SACMAT
2010
ACM
14 years 8 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino