In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a securit...
In the ubiquitous computing environment, we believe that P2P-based context-aware application utilizing sensing data is important. However, since sensors are not placed under the c...
The automatic and unobtrusive identification of user's activities is one of the challenging goals of context-aware computing. This paper discusses and experimentally evaluate...