International audienceThe novel scenarios enabled by emerging mobile social applications raise serious concerns regarding access control of users' contextual and social data. Given the variety of existing and upcoming social applications, it is important to provide (i) generic yet flexible policy models that combine expressivity with personalization, (ii) actual running infrastructures to en- force policy-based access control on heterogenous devices with minimal development/deployment effort, and (iii) user-interfaces to allow the easy specification of policies without dealing with the complexity of the underlying policy and data models. Toward this goal, in this paper we make three contributions. First, we present a novel policy framework ...
The ubiquity of low-cost GPS-enabled mobile devices and the proliferation of online social networks ...
Part 6: Mobile ComputingInternational audienceMulti-tenancy, elasticity and dynamicity pose several ...
Abstract. User’s privacy concerns represent one of the most serious obstacles to the wide adoption o...
Abstract. With the increased prevalence of advanced mobile devices (the so-called “smart ” phones), ...
Considering user-centric systems, the problem of controlling the access to reserved resources is sti...
Significant effort has been invested in developing expressive and flexible access-control languages ...
The popularity of smart mobile devices, initiatives such as "bring your own device", and the increas...
International audienceWith the increased prevalence of advanced mobile devices (the so-called \smart...
International audienceMany papers have addressed policy-based management of networks focusing on sec...
Significant effort has been invested in developing expressive and flexible access-control languages ...
International audienceWith the increased prevalence of advanced mobile devices (the so-called “smart...
Mobile social networks give online social networking sites the abilities to extend their services to...
Web browsers are a common platform for delivering cross-platform applications. However, they current...
Smart phones pose new challenges to usable security. Current means of specifying security policies o...
The security policies of mobile devices that describe how we should use these devices are often inf...
The ubiquity of low-cost GPS-enabled mobile devices and the proliferation of online social networks ...
Part 6: Mobile ComputingInternational audienceMulti-tenancy, elasticity and dynamicity pose several ...
Abstract. User’s privacy concerns represent one of the most serious obstacles to the wide adoption o...
Abstract. With the increased prevalence of advanced mobile devices (the so-called “smart ” phones), ...
Considering user-centric systems, the problem of controlling the access to reserved resources is sti...
Significant effort has been invested in developing expressive and flexible access-control languages ...
The popularity of smart mobile devices, initiatives such as "bring your own device", and the increas...
International audienceWith the increased prevalence of advanced mobile devices (the so-called \smart...
International audienceMany papers have addressed policy-based management of networks focusing on sec...
Significant effort has been invested in developing expressive and flexible access-control languages ...
International audienceWith the increased prevalence of advanced mobile devices (the so-called “smart...
Mobile social networks give online social networking sites the abilities to extend their services to...
Web browsers are a common platform for delivering cross-platform applications. However, they current...
Smart phones pose new challenges to usable security. Current means of specifying security policies o...
The security policies of mobile devices that describe how we should use these devices are often inf...
The ubiquity of low-cost GPS-enabled mobile devices and the proliferation of online social networks ...
Part 6: Mobile ComputingInternational audienceMulti-tenancy, elasticity and dynamicity pose several ...
Abstract. User’s privacy concerns represent one of the most serious obstacles to the wide adoption o...