Middlewares for smart objects and smart environments: overview and comparison
In the last few years, the Internet of Things (IoT) is gaining more and more attention both in
the academic and in the industrial worlds. IoT is a concept describing a vision in which …
the academic and in the industrial worlds. IoT is a concept describing a vision in which …
[图书][B] Mobility, data mining and privacy: Geographic knowledge discovery
F Giannotti, D Pedreschi - 2008 - books.google.com
The technologies of mobile communications and ubiquitous computing are p-vading our
society. Wireless networks are becoming the nerves of our territory, especially in the urban …
society. Wireless networks are becoming the nerves of our territory, especially in the urban …
Supporting location-based conditions in access control policies
Location-based Access Control (LBAC) techniques allow taking users' physical location into
account when determining their access privileges. In this paper, we present an approach to …
account when determining their access privileges. In this paper, we present an approach to …
A spatio-temporal role-based access control model
I Ray, M Toahchoodee - IFIP Annual Conference on Data and Applications …, 2007 - Springer
With the growing advancement of pervasive computing technologies, we are moving
towards an era where spatio-temporal information will be necessary for access control. The …
towards an era where spatio-temporal information will be necessary for access control. The …
LRBAC: A location-aware role-based access control model
With the growing use of wireless networks and mobile devices, we are moving towards an
era where location information will be necessary for access control. The use of location …
era where location information will be necessary for access control. The use of location …
On partial least squares in head pose estimation: How to simultaneously deal with misalignment
Head pose estimation is a critical problem in many computer vision applications. These
include human computer interaction, video surveillance, face and expression recognition. In …
include human computer interaction, video surveillance, face and expression recognition. In …
Access control for active spaces
G Sampemane, P Naldurg… - 18th Annual Computer …, 2002 - ieeexplore.ieee.org
Active Spaces are physical spaces augmented with heterogeneous computing and
communication devices along with supporting software infrastructure. This integration …
communication devices along with supporting software infrastructure. This integration …
Ambient intelligence: The mycampus experience
Over the past five years, the MyCampus group at Carnegie Mellon University has been
developing and experimenting with Ambient Intelligence technologies aimed at enhancing …
developing and experimenting with Ambient Intelligence technologies aimed at enhancing …
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an
era where location information will be necessary for access control. The use of location …
era where location information will be necessary for access control. The use of location …
Constructing, visualizing, and analyzing a digital footprint
SD Weaver, M Gahegan - Geographical Review, 2007 - Taylor & Francis
Herein, we discuss the desire for new technology, the need for security, and the right to
privacy; in doing so, we argue that each of these concerns comprises an important, tripartite …
privacy; in doing so, we argue that each of these concerns comprises an important, tripartite …