The sensors of a context-aware system extract contextual information from the environment and relay that information to higher-level processes of the system so to influence the system\u2019s control decisions. However, an adversary can maliciously influence such controls indirectly by manipulating the environment in which the sensors are monitoring, thereby granting privileges the adversary would otherwise not normally have. To address such context monitoring issues, we extend CASSEC by incorporating sentience-like constructs, which enable the emulation of \u201dconfidence\u201d, into our proximity-based access control model to grant the system the ability to make more inferable decisions based on the degree of reliability of extracted cont...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Context-aware computing has been a rapidly growing research area, however its uses have been predomi...
In this paper, we present a systematic survey on the contextual information based proximity detectio...
In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees\...
In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees’...
Advances in technology and wide scale deployment of networking enabled portable devices such as smar...
As computing environments become both mobile and pervasive, the need for robust and flexible access ...
Context-awareness emerges as an important element of future wireless systems. In particular, concept...
In this paper, we present the design and implementation of ConXsense, a framework utilizing context ...
Rapid advances in computing technology have made it possible to create a pervasive computing environ...
Pervasive computing leads to an increased integration between the real world and the computational w...
Advances in technology and wide scale deployment of networking enabled portable devices such as smar...
Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a verifier (t...
AbstractThis paper addresses the design of architectures for proximity-aware services with unobtrusi...
AbstractThis paper addresses the design of architectures for proximity-aware services with unobtrusi...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Context-aware computing has been a rapidly growing research area, however its uses have been predomi...
In this paper, we present a systematic survey on the contextual information based proximity detectio...
In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees\...
In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees’...
Advances in technology and wide scale deployment of networking enabled portable devices such as smar...
As computing environments become both mobile and pervasive, the need for robust and flexible access ...
Context-awareness emerges as an important element of future wireless systems. In particular, concept...
In this paper, we present the design and implementation of ConXsense, a framework utilizing context ...
Rapid advances in computing technology have made it possible to create a pervasive computing environ...
Pervasive computing leads to an increased integration between the real world and the computational w...
Advances in technology and wide scale deployment of networking enabled portable devices such as smar...
Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a verifier (t...
AbstractThis paper addresses the design of architectures for proximity-aware services with unobtrusi...
AbstractThis paper addresses the design of architectures for proximity-aware services with unobtrusi...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Context-aware computing has been a rapidly growing research area, however its uses have been predomi...
In this paper, we present a systematic survey on the contextual information based proximity detectio...