Abstract: Provision of adaptive access control is key to allowing users harness the full potential of ubiquitous computing environments. In this paper, we introduce the M-Zones Access Control (MAC) process, which provides user-centric attribute-based access control, together with automatic reconfiguration of resources in response to the changes in the set of users physically present in the environment. User control is realised via user-specified policies, which are analysed in tandem with system policies and policies of other users, whenever events occur that require policy decisions and associated configuration operations. In such a system users ’ policies may habitually conflict with system policies, or indeed other users ’ policies; thus...
Recent research on ubiquitous computing has introduced a new concept of activity-based computing as ...
The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users ...
Abstract. The widespread diffusion of wireless-enabled portable de-vices creates novel opportunities...
Provision of adaptive access control is key to allowing users harness the full potential of ubiquito...
A key challenge for the ubiquitous computing community is the development of systems that will allow...
The focus of this work is developing processes to enable user-specified policies to help roaming use...
The focus of this work is developing processes to enable user-specified policies to help roaming use...
In this paper, we describe a user-centric access control process for devices and services in smart s...
In this paper, we describe a user-centric access control process for devices and services in smart s...
The purpose of ubiquitous computing is anywhere and anytime access to information within computing i...
International audienceUbiquitous computing systems can be regarded as open systems where heterogeneo...
Role based access control (RBAC) assigns access permissions to a role rather than a user. This simpl...
This report proposes a policy refinement process design specifically to assist in the management of ...
Abstract. The ubiquitous computing paradigm suggests that we are going to be surrounded by countless...
The new paradigm in mobile services lies in providing a location-based user experience and here lies...
Recent research on ubiquitous computing has introduced a new concept of activity-based computing as ...
The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users ...
Abstract. The widespread diffusion of wireless-enabled portable de-vices creates novel opportunities...
Provision of adaptive access control is key to allowing users harness the full potential of ubiquito...
A key challenge for the ubiquitous computing community is the development of systems that will allow...
The focus of this work is developing processes to enable user-specified policies to help roaming use...
The focus of this work is developing processes to enable user-specified policies to help roaming use...
In this paper, we describe a user-centric access control process for devices and services in smart s...
In this paper, we describe a user-centric access control process for devices and services in smart s...
The purpose of ubiquitous computing is anywhere and anytime access to information within computing i...
International audienceUbiquitous computing systems can be regarded as open systems where heterogeneo...
Role based access control (RBAC) assigns access permissions to a role rather than a user. This simpl...
This report proposes a policy refinement process design specifically to assist in the management of ...
Abstract. The ubiquitous computing paradigm suggests that we are going to be surrounded by countless...
The new paradigm in mobile services lies in providing a location-based user experience and here lies...
Recent research on ubiquitous computing has introduced a new concept of activity-based computing as ...
The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users ...
Abstract. The widespread diffusion of wireless-enabled portable de-vices creates novel opportunities...