The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper we present the Anubis protocol for remote...
Telecom based service providers are relentlessly trying to accelerate their service offerings to match the pace at which the users are embracing the Web. In reality IMS based Telecom and Internet based Web 2.0 networks have their own advantages and need to co-exist to create an enriched user experience. The convergence of IP Multimedia subsystem (IMS) based Telecom and Web 2.0 based networks is slowly...
Currently the Location Based Services (LBS) tend to be more large-scale, distribute and open, which brings up new challenges to the design of spatially aware access control models. Nowadays location based access control models encounter difficulties in both the flexibility of expression, and the scalability and efficiency of the policy management. To address these challenges, in this paper we propose...
Traditional data protection schemes deployed in Enterprise Rights Management systems rely on centralised infrastructures where recipients must request authorisation for data access from remote evaluation authorities, trusted by the data originator to keep the data decryption keys and evaluate authorisation policies. During emergency situations when network connection is intermittent these solutions...
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trust users once they have authenticated, despite the fact that they may reach unauthorized situations. We analyse how dynamic information can be used to improve security in the authorization process, especially in the case of...
Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have...
One of the privacy threats recognized in the use of LBS is represented by an adversary having information about the presence of individuals in certain locations, and using this information together with an (anonymous) LBS request to re-identify the issuer of the request associating her to the requested service. Several papers have proposed techniques to prevent this, assuming that the use of the service...
Inference of high-level context is becoming crucial in development of context-aware applications. An example is social context inference - i.e., deriving social relations based upon the user's daily communication with other people. The efficiency of this mechanism mainly depends on the method(s) used to draw inferences based on existing evidence and sample information, such as a training data. Our...
Ubiquitous computing environment comprises mobile users, system services, system resource, and sensors embedded into physical environment. The ubiquitous, dynamic, invisible, and open nature of these environments introduces challenging security issues that demand new technical approaches in access control. The exiting access control model for ubiquitous computing environment are lack of context-based...
In recent years, radio frequency identification (RFID) technology has been developing rapidly worldwide due to its convenience and efficiency. However, the security issues cannot be ignored when enterprise adopts RFID technology. It needs to take into consideration of the suitable access control mechanisms for RFID. The traditional role-based access control model (RBAC) is not robust enough to deploy...
The increasing diffusion of portable devices and the widespread availability of wireless networks where users live, work and travel, together create opportunities for users to access resources anywhere, any time and from various access devices. Ubiquitous systems in charge of providing and controlling access to these resources require a precise conceptual model to define the user context and the resources...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.