Recent advances in embedded computing and communications technology have facilitated the development of intelligent environments, enabling exciting new applications, but also creating new challenges for security. The large number of heterogeneous devices, mobile users, and new kinds of applications all contribute to making security administration and enforcement more difficult. We study the problem of access control for such environments, which we call Active Spaces. Context plays an important role in these systems---users may have different permissions in different situations, making access control harder to configure, enforce and understand. Collaboration between users is common in these spaces, and needs to be supported by the system....
In pervasive computing environments, changes in context may trigger changes in an individual's...
Abstract. In pervasive computing environments, changes in context may trigger changes in an individu...
Abstract. The explosive evolution of pervasive computing environments presents several new challenge...
120 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2005.We evaluate our model on the ...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
Our society is increasingly moving towards richer forms of information exchange where mobility of pr...
The increased pervasiveness of wireless mobile computing devices draws new attention to the need for...
In this paper, we describe a user-centric access control process for devices and services in smart s...
The emerging mobile computing environment draws new attention to the need for co-ordination among ne...
AbstractOur society is increasingly moving towards richer forms of information exchange where mobili...
In pervasive computing environments, changes in context may trigger changes in an individual's acces...
The increased pervasiveness of wireless mobile com-puting devices draws new attention to the need fo...
Cyber physical ecosystem connects different intelligent devices over heterogeneous networks. Various...
One of the main security problems of Smart-M3 platform is a lack of dynamic security management supp...
In pervasive computing environments, changes in context may trigger changes in an individual's...
Abstract. In pervasive computing environments, changes in context may trigger changes in an individu...
Abstract. The explosive evolution of pervasive computing environments presents several new challenge...
120 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2005.We evaluate our model on the ...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
Our society is increasingly moving towards richer forms of information exchange where mobility of pr...
The increased pervasiveness of wireless mobile computing devices draws new attention to the need for...
In this paper, we describe a user-centric access control process for devices and services in smart s...
The emerging mobile computing environment draws new attention to the need for co-ordination among ne...
AbstractOur society is increasingly moving towards richer forms of information exchange where mobili...
In pervasive computing environments, changes in context may trigger changes in an individual's acces...
The increased pervasiveness of wireless mobile com-puting devices draws new attention to the need fo...
Cyber physical ecosystem connects different intelligent devices over heterogeneous networks. Various...
One of the main security problems of Smart-M3 platform is a lack of dynamic security management supp...
In pervasive computing environments, changes in context may trigger changes in an individual's...
Abstract. In pervasive computing environments, changes in context may trigger changes in an individu...
Abstract. The explosive evolution of pervasive computing environments presents several new challenge...