• No results found

Context-Aware Access Control

Authentication and Context Awareness Access Control in Internet of Things

Authentication and Context Awareness Access Control in Internet of Things

... to access control in IoT over the latest years is ...of access control in ...with context-aware access control ...the access control policy for IoT ...

7

Security Issues in Context Aware System

Security Issues in Context Aware System

... a context-aware system for user access model. Context-aware computing system successfully undertaking by sensor ...the context aware system is to find and identify the ...

6

Context-Aware Attribute-Based Techniques for Data Security and Access Control in Mobile Cloud Environment

Context-Aware Attribute-Based Techniques for Data Security and Access Control in Mobile Cloud Environment

... the context and identify the user to the outside world. Various context information such as location, phone call history, Web browser history ...a context-aware platform for user ...

232

Intrusion Detection in Wireless Networks using FUZZY Neural Networks and Dynamic Context Aware Role based Access Control Security (DCARBAC)

Intrusion Detection in Wireless Networks using FUZZY Neural Networks and Dynamic Context Aware Role based Access Control Security (DCARBAC)

... Dynamic Context Aware Role Based Access Control Security Model which can provide Security Services based on users and network environmental changes using Fuzzy Logic and the DCARBAC for the ...

9

Middleware for efficient and confidentiality-aware federation of access control policies

Middleware for efficient and confidentiality-aware federation of access control policies

... policy-based access con- trol infrastructures was defined by IETF and DMTF and refined by the XACML standard ...actual access control ...an access control decision from the PDP through ...

15

Context-sensitive Constraints for Access Control of Business Processes

Context-sensitive Constraints for Access Control of Business Processes

... workflow access control models should be organizational ...workflow access control model based on RBAC model extended with case and organization unit entities and appropriate ...

30

Privacy Aware using Temporal Role Based Access Control Model

Privacy Aware using Temporal Role Based Access Control Model

... of context constraints: activity context constraint and role context ...constraint. Context conditions are applied to both activities and roles associated with the ...all context ...

8

Trust-based model for privacy control in context aware systems

Trust-based model for privacy control in context aware systems

... Strathprints is designed to allow users to access the research output of the University of Strathclyde. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other ...

6

SAware: Sensor-based Context Awareness for Smartphone Access Control

SAware: Sensor-based Context Awareness for Smartphone Access Control

... In this paper, We divide the scenario into familiar Context and unfamiliarContext. With present technology, we can use the mobile device’s sensors to infer the user ’ s context. we rely on positioning ...

7

A FAULT-TOLERANT EMERGENCY-AWARE ACCESS CONTROL SCHEME FOR CYBER-PHYSICAL SYSTEMS

A FAULT-TOLERANT EMERGENCY-AWARE ACCESS CONTROL SCHEME FOR CYBER-PHYSICAL SYSTEMS

... Based Access Control (RBAC) [17] is one of the most influential schemes for authorized access ...complex access control ...Based Access Control (CBAC) [18] avoids the ...

12

Privacy-Aware Risk-Based Access Control Systems

Privacy-Aware Risk-Based Access Control Systems

... to context awareness, other works propose to increase the access control flexibility by taking in consideration operational ...Risk-Adaptable Access Control (RAdAC) mechanism that ...

192

An Enhanced Energy Efficient Context-Aware Medium Access Control Protocol for Wireless Body Area Networks

An Enhanced Energy Efficient Context-Aware Medium Access Control Protocol for Wireless Body Area Networks

... channel access control for reliable link level communication and are responsible for coordinating the access from active ...A Context Aware MAC (CAMAC) protocol can overcome challenges ...

8

TRAAC: Trust and Risk Aware Access Control

TRAAC: Trust and Risk Aware Access Control

... cannot access some ...the context when making trust updates, such as the reason behind a particular ...the context of a violation, without necessarily changing the data owner’s ...

8

Network Load Aware Adaptive Channel Access Control for WLAN

Network Load Aware Adaptive Channel Access Control for WLAN

... Wireless local area network (WLAN) brings us a low cost and high bandwidth experience and thus plays a critically important role in current/future networks to support high-rate transmissions. To better provide ...

6

Context-Aware Semantic Inpainting

Context-Aware Semantic Inpainting

... Abstract—In recent times, image inpainting has witnessed rapid progress due to the generative adversarial networks (GANs) that are able to synthesize realistic contents. However, most existing GAN-based methods for ...

14

Context-aware Readings with Inbooki

Context-aware Readings with Inbooki

... the context of the readers and adapt the content and the flow to ...considered context-aware ...little context information; instead, our approach aims at being more general and at considering ...

9

Context-Aware Network Security

Context-Aware Network Security

... In this chapter, we argue that IDS and IPS should dynamically adapt the parallelization and separation of rules based on the observed traffic on the network and the input rules database. That is, all IDS and IPS ...

113

Survey On Context Aware Architecture

Survey On Context Aware Architecture

... of context-aware applications in AN intelligent ...the context model of a selected ...components: context information, context ratiocinator engine, context acquisition module and ...

8

STATIC CONTEXT MODEL FOR CONTEXT AWARE E-LEARNING

STATIC CONTEXT MODEL FOR CONTEXT AWARE E-LEARNING

... Context aware E-Learning systems provide learning content according to a learner’s ...learner’s context, the parameters that constitute the context and the values of these parameters in the ...

10

A Mobility Aware File System   file availability in a mobile aware, context aware environment

A Mobility Aware File System file availability in a mobile aware, context aware environment

... file access behaviour on UNIX systems whereby locality of reference is strong in other words, most files on a system are not considered collaborative, and users tend to modify their own files and theirs alone in ...

85

Show all 10000 documents...

Related subjects