Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote services from a wide range of settings. To provide this flexibility, security policies must be adaptive to the user’s environment when the request is made. In our work, we define context to include the spatiotemporal aspects of the user request, in addition to quantifiable environmental factors determined by the server hosting the resource. We identify a number of key open problems in this field and propose potential solutions to some of the problems.
International audienceThe rapid growth of communication networking, ubiquitous sensing, and signal p...
Advances in technology and wide scale deployment of networking enabled portable devices such as smar...
The increased pervasiveness of wireless mobile com-puting devices draws new attention to the need fo...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
context-aware computing, location-based computing, security, authentication This paper presents a pa...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees\...
The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users ...
The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users ...
Abstract. The widespread diffusion of wireless-enabled portable de-vices creates novel opportunities...
International audienceIn conventional security systems, protected resources such as documents, hardw...
Wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiq...
none3The widespread diffusion of wireless-enabled portable devices creates novel opportunities for u...
International audienceThe rapid growth of communication networking, ubiquitous sensing, and signal p...
International audienceThe rapid growth of communication networking, ubiquitous sensing, and signal p...
Advances in technology and wide scale deployment of networking enabled portable devices such as smar...
The increased pervasiveness of wireless mobile com-puting devices draws new attention to the need fo...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
context-aware computing, location-based computing, security, authentication This paper presents a pa...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees\...
The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users ...
The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users ...
Abstract. The widespread diffusion of wireless-enabled portable de-vices creates novel opportunities...
International audienceIn conventional security systems, protected resources such as documents, hardw...
Wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiq...
none3The widespread diffusion of wireless-enabled portable devices creates novel opportunities for u...
International audienceThe rapid growth of communication networking, ubiquitous sensing, and signal p...
International audienceThe rapid growth of communication networking, ubiquitous sensing, and signal p...
Advances in technology and wide scale deployment of networking enabled portable devices such as smar...
The increased pervasiveness of wireless mobile com-puting devices draws new attention to the need fo...