Sciweavers

1927 search results - page 76 / 386
» An Access Control Model for Location based Services
Sort
View
TISSEC
2010
121views more  TISSEC 2010»
14 years 8 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...
MOBICOM
1998
ACM
15 years 2 months ago
Multi-Sensor Location Tracking
CT In order to support location-aware applications it is necessary to locate people and equipment in near real-time. To avoid unnecessary exposure of details of the underlying trac...
Ulf Leonhardt, Jeff Magee
GRC
2007
IEEE
15 years 4 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu
AINA
2009
IEEE
15 years 4 months ago
A New Approach to Model Web Services' Behaviors Based on Synchronization
This paper introduces a novel approach for modelling and specifying behaviors of Web services. This approach excludes Web services from any composition scenario and sheds the ligh...
Zakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Jam...
GRID
2005
Springer
15 years 3 months ago
Adaptive trust negotiation and access control for grids
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...