The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Existing context-based access control mechanisms have a problem of tradeoffs between the expressive power and the management efficiency of authorization policy. In this paper we introduce the context-aware role engineering which is a new concept for context-based access control and context-aware service scenario driven role engineering approach. The context-aware role engineering enables that context-based...
Ubiquitous computing environment comprises mobile users, system services, system resource, and sensors embedded into physical environment. The ubiquitous, dynamic, invisible, and open nature of these environments introduces challenging security issues that demand new technical approaches in access control. The exiting access control model for ubiquitous computing environment are lack of context-based...
In pervasive computing environments, where various types of information are publicly owned, and multiple users access the networks via various networked devices anytime and anywhere, access control that grants permission to an authorized user is definitely needed for secure information access. Context awareness refers to the idea that computers can both sense and react based on various context in...
In pervasive computing environments (PCE), context information can have a strong impact on application adaptation, not only at application logic level but also security management level. From a access control perspective, it is required that the access control models take into account context information such as location and time, in determining whether access should be allowed or not. As context...
The following topics are dealt with: peer-to-peer and sensor network service platforms; Internet; service architectures and IMS evolution; next generation service delivery; RFID empowered business; RFID wireless system; authentication and authorization; middleware; network management; distance classroom; collaborative education; ubiquitous networking and context-aware services
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.