Abstract—Following Mark Weiser’s vision of ubiquitous com-puting and calm technology, computer systems should run in the background, preferably without the user noticing it at all. The gathering and disclosure of contextual information on the one hand enables the improvement of system behaviour towards a more autonomous and adaptive behaviour but on the other hand raises privacy issues by disclosing personal data. Thus, a major challenge in ubiquitous computing environments is achieving a good balance between convenience and control over personal data. In this paper we describe an access control mechanism for context data that enables the user to control his personal data in a convenient and non-intrusive way. The approach is based on exist...
In the present age, context-awareness is an important aspect of the dynamic environments and the dif...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
In this paper, we describe a user-centric access control process for devices and services in smart s...
Wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiq...
Pervasive-computing infrastructures necessarily collect a lot of context information to disseminate ...
Role based access control (RBAC) assigns access permissions to a role rather than a user. This simpl...
Pervasive environments are characterized by ubiquitous, mobile and embedded computing devices and wi...
In this paper, we describe a user-centric access control process for devices and services in smart s...
Abstract—Context-aware computing has been an intensively researched topic for years already. Consequ...
The concept of context originated in the ubiquitous computing domain where information regarding the...
E-Health systems logically demand a sufficiently fine-grained authorization policy for access contro...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
To leverage proactive context-aware services for mobile handsets, an for the management, aggregation...
Recently ubiquitous technology has invaded almost every aspect of the modern life. Several applicati...
In ubiquitous computing, the user will be interrupted in performing a task only if the information i...
In the present age, context-awareness is an important aspect of the dynamic environments and the dif...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
In this paper, we describe a user-centric access control process for devices and services in smart s...
Wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiq...
Pervasive-computing infrastructures necessarily collect a lot of context information to disseminate ...
Role based access control (RBAC) assigns access permissions to a role rather than a user. This simpl...
Pervasive environments are characterized by ubiquitous, mobile and embedded computing devices and wi...
In this paper, we describe a user-centric access control process for devices and services in smart s...
Abstract—Context-aware computing has been an intensively researched topic for years already. Consequ...
The concept of context originated in the ubiquitous computing domain where information regarding the...
E-Health systems logically demand a sufficiently fine-grained authorization policy for access contro...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
To leverage proactive context-aware services for mobile handsets, an for the management, aggregation...
Recently ubiquitous technology has invaded almost every aspect of the modern life. Several applicati...
In ubiquitous computing, the user will be interrupted in performing a task only if the information i...
In the present age, context-awareness is an important aspect of the dynamic environments and the dif...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
In this paper, we describe a user-centric access control process for devices and services in smart s...