We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Role-Based Access Control (RBAC) models have emerged as a leading access control approach for today’s information systems. Hybrid role hierarchies introduced in the Generalized ...
As users store and share more digital content at home, access control becomes increasingly important. One promising approach for helping non-expert users create accurate access po...
Michelle L. Mazurek, Peter F. Klemperer, Richard S...
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
In this paper, we describe a new multi-purpose audio-visual database on the context of speech interfaces for controlling household electronic devices. The database comprises speec...