Abstract. In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, whil...
International audienceThe first challenge that we tackle in this paper is how to conduct access cont...
International audienceThe first challenge that we tackle in this paper is how to conduct access cont...
In order to ensure secure sharing of resources in an ad-hoc network of handheld devices in a multime...
Abstract—The growing intelligence and popularity of smart-phones and the advances in Mobile Ubiquito...
Using recent technologies such as Bluetooth, mobile users can share digital content (e.g., photos, v...
As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the s...
As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the s...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
In the ubiquitous computing environment of wireless access control, access is granted on having succ...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the s...
Ubiquitous Computing foresees a massively networked world supporting a population of diverse but coo...
Emerging computing infrastructures are heterogeneous, ubiquitous and mobile. Devices from personal c...
In the ubiquitous computing environment of wireless access control, access is granted on having succ...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
International audienceThe first challenge that we tackle in this paper is how to conduct access cont...
International audienceThe first challenge that we tackle in this paper is how to conduct access cont...
In order to ensure secure sharing of resources in an ad-hoc network of handheld devices in a multime...
Abstract—The growing intelligence and popularity of smart-phones and the advances in Mobile Ubiquito...
Using recent technologies such as Bluetooth, mobile users can share digital content (e.g., photos, v...
As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the s...
As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the s...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
In the ubiquitous computing environment of wireless access control, access is granted on having succ...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the s...
Ubiquitous Computing foresees a massively networked world supporting a population of diverse but coo...
Emerging computing infrastructures are heterogeneous, ubiquitous and mobile. Devices from personal c...
In the ubiquitous computing environment of wireless access control, access is granted on having succ...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
International audienceThe first challenge that we tackle in this paper is how to conduct access cont...
International audienceThe first challenge that we tackle in this paper is how to conduct access cont...
In order to ensure secure sharing of resources in an ad-hoc network of handheld devices in a multime...