Sciweavers

602 search results - page 17 / 121
» An access control model for mobile physical objects
Sort
View
QEST
2006
IEEE
15 years 7 months ago
Measuring and Modeling of Application Flow Length in Commercial GPRS Networks
New mobile access networks provide reasonable high bandwidth to allow true internet access. This paper models two dominant applications of those networks. One application, WAP, is...
Roger Kalden, Boudewijn R. Haverkort
CCS
2009
ACM
15 years 8 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
CHI
2010
ACM
15 years 2 months ago
Designing a CD augmentation for mobile phones
Interacting with physical CDs can be a very tangible and explorative experience. However, physical objects can't provide access to the digital services we are used to when us...
Niels Henze, Susanne Boll
106
Voted
AINA
2009
IEEE
15 years 6 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
IDEAS
2005
IEEE
113views Database» more  IDEAS 2005»
15 years 7 months ago
Fine-Granularity Access Control in 3-Tier Laboratory Information Systems
Laboratory information systems (LIMS) are used in life science research to manage complex experiments. Since LIMS systems are often shared by different research groups, powerful a...
Xueli Li, Nomair A. Naeem, Bettina Kemme