Role-based Access Control (RBAC) became popular because it can handle the complicated enterprise-wide access requests while traditional access control models such as mandatory access control and discretionary access control cannot. However, it is not suitable for a mobile environment because (i) there is no central trusted authentication entity that activates each user’s roles, (ii) there are not many roles involved in such environment, and (iii) access control decisions depend on specific actions to be performed before the decision is taken. In this paper, we introduce a provisional authorization model with location-based predicates embedded in the policy specification languages. It includes three classes of location-based condition...
With the growing use of wireless networks and mobile devices, we are moving towards an era where loc...
The spreading wireless accessibility to the Internet stimulates the provisioning of mobile commercia...
Abstract. Mobile agent systems provide new perspectives for distributed e-com-merce applications. Th...
Role-based Access Control (RBAC) became popular because it can handle the complicated enterprise-wid...
Role Based Access Control (RBAC) is an effective access control method for protecting i...
The emerging mobile computing environment draws new attention to the need for co-ordination among ne...
Our society is increasingly moving towards richer forms of information exchange where mobility of pr...
The increased pervasiveness of wireless mobile computing devices draws new attention to the need for...
Published version of an article from the book: Security and privacy in mobile information and commun...
Mobile ad-hoc networks support interactions and collaborations among autonomous devices by enabling ...
none3The spreading wireless accessibility to the Internet stimulates the provisioning of mobile comm...
In the last few years there has been an increasing interest for a novel category of access control m...
We consider collaborative applications of wireless mobile devices where users (possibly from dif-fer...
The topic addressed in this thesis concerns the relationship between spatial knowledge and informati...
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the admin...
With the growing use of wireless networks and mobile devices, we are moving towards an era where loc...
The spreading wireless accessibility to the Internet stimulates the provisioning of mobile commercia...
Abstract. Mobile agent systems provide new perspectives for distributed e-com-merce applications. Th...
Role-based Access Control (RBAC) became popular because it can handle the complicated enterprise-wid...
Role Based Access Control (RBAC) is an effective access control method for protecting i...
The emerging mobile computing environment draws new attention to the need for co-ordination among ne...
Our society is increasingly moving towards richer forms of information exchange where mobility of pr...
The increased pervasiveness of wireless mobile computing devices draws new attention to the need for...
Published version of an article from the book: Security and privacy in mobile information and commun...
Mobile ad-hoc networks support interactions and collaborations among autonomous devices by enabling ...
none3The spreading wireless accessibility to the Internet stimulates the provisioning of mobile comm...
In the last few years there has been an increasing interest for a novel category of access control m...
We consider collaborative applications of wireless mobile devices where users (possibly from dif-fer...
The topic addressed in this thesis concerns the relationship between spatial knowledge and informati...
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the admin...
With the growing use of wireless networks and mobile devices, we are moving towards an era where loc...
The spreading wireless accessibility to the Internet stimulates the provisioning of mobile commercia...
Abstract. Mobile agent systems provide new perspectives for distributed e-com-merce applications. Th...