The exploitation of context-awareness, especially in mobile devices bears a huge potential. For example, mobile workers benefit from systems that adapt security settings to the current situation. However, context-aware computing strongly relies on raw data from various sources that might be neither trustworthy nor authoritative. In this work, we present a context model that explicitly reflects security and relevance of context information sources in order to improve context detection. We introduce a security rating denoting the trustworthiness of the context information, i.e., its vulnerability to forgery, and a relevance rating denoting the source’s decisive impact on context detection
With the increasing popularity of personal mobile devices like smartphones, more and more ordinary u...
In smart environments, pervasive computing contributes significantly in improving daily life activit...
In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees\...
The exploitation of context-awareness, especially in mobile devices bears a huge potential. For exam...
Strong security for mobile devices plays an increasingly important role in protecting sensitive data...
Advances in technology and wide scale deployment of networking enabled portable devices such as smar...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
Context-awareness emerges as an important element of future wireless systems. In particular, concept...
In this paper, we present the design and implementation of ConXsense, a framework utilizing context ...
We present ConXsense, the first framework for context-aware access control on mobile devices based o...
Coming along with the spread of location-independent wireless networks and attractive mobile devices...
For automatic or context-aware systems a major issue is user trust, which is to a large extent deter...
For automatic or context-aware systems a major issue is user trust, which is to a large extent deter...
The revolution of mobile phones era hasbrought the innovative smartphones technology. As aresult, re...
With the increasing popularity of personal mobile devices like smartphones, more and more ordinary u...
In smart environments, pervasive computing contributes significantly in improving daily life activit...
In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees\...
The exploitation of context-awareness, especially in mobile devices bears a huge potential. For exam...
Strong security for mobile devices plays an increasingly important role in protecting sensitive data...
Advances in technology and wide scale deployment of networking enabled portable devices such as smar...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
Context-awareness emerges as an important element of future wireless systems. In particular, concept...
In this paper, we present the design and implementation of ConXsense, a framework utilizing context ...
We present ConXsense, the first framework for context-aware access control on mobile devices based o...
Coming along with the spread of location-independent wireless networks and attractive mobile devices...
For automatic or context-aware systems a major issue is user trust, which is to a large extent deter...
For automatic or context-aware systems a major issue is user trust, which is to a large extent deter...
The revolution of mobile phones era hasbrought the innovative smartphones technology. As aresult, re...
With the increasing popularity of personal mobile devices like smartphones, more and more ordinary u...
In smart environments, pervasive computing contributes significantly in improving daily life activit...
In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees\...