Future office environments as the Virtual Office of the Future (VoF) are characterized by service-orientation and context-awareness. Mostly they will be accessed by mobile users. Hence, new security challenges arise. Especially, it is necessary to strengthen security measures and to minimize the security relevant user interactions at the same time. Consequently, the goals of security are defined as the security properties. These are confidentiality, integrity, accountability and availability. In addition, existing context-aware security approaches are surveyed and their disadvantages in VoF settings are pointed out. Subsequently, an adjustable, contextaware security concept is presented. This high-level concept focuses on the attainment of ...
Strong security for mobile devices plays an increasingly important role in protecting sensitive data...
Abstract. Driven by new network and middleware technologies such as mobile broadband, near-field com...
Driven by new network and middleware technologies such as mobile broadband, near-field communication...
International audienceInternet of Things applications encompass home-automation, health, transportat...
AbstractRecent research in security shows a real need for contextual information in building highly ...
The openness and heterogeneity of next generation communication networks are now highlighting more s...
Abstract. The openness and heterogeneity of next generation communication networks are now highlight...
The wide adoption of handled devices and remote ser-vices arises a number of security problems for u...
In this paper we introduce the concept of context-aware services as an extended form of locationbase...
In ubiquitous computing environments, distributed services hosted by electronic devices can be compo...
International audienceThe successful deployment of a security policy is closely related not only to ...
Last decades the contextual approach became an important methodology of analysing information ...
Abstract: In this paper we introduce the concept of context-aware services as an extended form of lo...
Coming along with the spread of location-independent wireless networks and attractive mobile devices...
The support of location computation on mobile devices (e.g. mobile phones, PDAs) has enabled the dev...
Strong security for mobile devices plays an increasingly important role in protecting sensitive data...
Abstract. Driven by new network and middleware technologies such as mobile broadband, near-field com...
Driven by new network and middleware technologies such as mobile broadband, near-field communication...
International audienceInternet of Things applications encompass home-automation, health, transportat...
AbstractRecent research in security shows a real need for contextual information in building highly ...
The openness and heterogeneity of next generation communication networks are now highlighting more s...
Abstract. The openness and heterogeneity of next generation communication networks are now highlight...
The wide adoption of handled devices and remote ser-vices arises a number of security problems for u...
In this paper we introduce the concept of context-aware services as an extended form of locationbase...
In ubiquitous computing environments, distributed services hosted by electronic devices can be compo...
International audienceThe successful deployment of a security policy is closely related not only to ...
Last decades the contextual approach became an important methodology of analysing information ...
Abstract: In this paper we introduce the concept of context-aware services as an extended form of lo...
Coming along with the spread of location-independent wireless networks and attractive mobile devices...
The support of location computation on mobile devices (e.g. mobile phones, PDAs) has enabled the dev...
Strong security for mobile devices plays an increasingly important role in protecting sensitive data...
Abstract. Driven by new network and middleware technologies such as mobile broadband, near-field com...
Driven by new network and middleware technologies such as mobile broadband, near-field communication...