In the future, a largely invisible and ubiquitous computing infrastructure will assist people with a variety of activities in the home and at work. The applications that will be deployed in such systems will create and manipulate private information and will provide access to a variety of other resources. Securing such applications is challenging for a number of reasons. Unlike traditional systems where access control has been explored, access decisions may depend on the context in which requests are made. We show how the well-developed notion of roles can be used to capture securityrelevant context of the environment in which access requests are made. By introducing environment roles, we create a uniform access control framework that can b...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Controlling access to resources is one of the most important protection goals for web-based collabor...
In the future, a largely invisible and ubiquitous computing infrastructure will assist people with ...
Context-awareness is an important aspect of the dynamic environments and the different types of cont...
Due to the rapid advancement of communication technologies, the ability to support access control to...
International audienceIn conventional security systems, protected resources such as documents, hardw...
Abstract: This paper presents a system architecture for supporting ubiquitous computing for mobile u...
ABSTRACT Widely strewn resources have made organizations engrossed to know not only who, when and fr...
The role-based access control (RBAC) has become the widely used access control system for providing ...
Abstract—Due to the rapid advancement of communication technologies, the ability to support access c...
Controlling access to resources is one of the most im-portant protection goals for web-based service...
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mo-bility...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees\...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Controlling access to resources is one of the most important protection goals for web-based collabor...
In the future, a largely invisible and ubiquitous computing infrastructure will assist people with ...
Context-awareness is an important aspect of the dynamic environments and the different types of cont...
Due to the rapid advancement of communication technologies, the ability to support access control to...
International audienceIn conventional security systems, protected resources such as documents, hardw...
Abstract: This paper presents a system architecture for supporting ubiquitous computing for mobile u...
ABSTRACT Widely strewn resources have made organizations engrossed to know not only who, when and fr...
The role-based access control (RBAC) has become the widely used access control system for providing ...
Abstract—Due to the rapid advancement of communication technologies, the ability to support access c...
Controlling access to resources is one of the most im-portant protection goals for web-based service...
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mo-bility...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees\...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Controlling access to resources is one of the most important protection goals for web-based collabor...