Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/MDM.2006.26guideproceedingsArticle/Chapter ViewAbstractPublication PagesmdmConference Proceedingsconference-collections
Article

Access Control and Privacy in Location-Aware Services forMobile Organizations

Published: 10 May 2006 Publication History

Abstract

In mobile organizations such as enterprises operating on field, healthcare organizations and military and civilian coalitions, individuals, because of the role they have, may need to access common information resources through location-aware applications. To enable a controlled and privacy preserving access to such applications, a comprehensive conceptual framework for an access control system enhanced with location privacy is presented.

Cited By

View all
  • (2013)Runtime adaptive multi-factor authentication for mobile devicesIBM Journal of Research and Development10.1147/JRD.2013.228112357:6(8-8)Online publication date: 1-Nov-2013
  • (2011)Prox-RBACProceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems10.1145/2093973.2094018(339-348)Online publication date: 1-Nov-2011
  • (2010)Enforcing spatial constraints for mobile RBAC systemsProceedings of the 15th ACM symposium on Access control models and technologies10.1145/1809842.1809860(99-108)Online publication date: 9-Jun-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
MDM '06: Proceedings of the 7th International Conference on Mobile Data Management
May 2006
ISBN:0769525261

Publisher

IEEE Computer Society

United States

Publication History

Published: 10 May 2006

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2013)Runtime adaptive multi-factor authentication for mobile devicesIBM Journal of Research and Development10.1147/JRD.2013.228112357:6(8-8)Online publication date: 1-Nov-2013
  • (2011)Prox-RBACProceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems10.1145/2093973.2094018(339-348)Online publication date: 1-Nov-2011
  • (2010)Enforcing spatial constraints for mobile RBAC systemsProceedings of the 15th ACM symposium on Access control models and technologies10.1145/1809842.1809860(99-108)Online publication date: 9-Jun-2010
  • (2009)Privacy of Value-Added Context-Aware Service CloudProceedings of the 1st International Conference on Cloud Computing10.1007/978-3-642-10665-1_50(547-552)Online publication date: 22-Nov-2009
  • (2008)A location aware role and attribute based access control systemProceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems10.1145/1463434.1463530(1-2)Online publication date: 5-Nov-2008
  • (2007)GEO-RBACACM Transactions on Information and System Security10.1145/1210263.121026510:1(2-es)Online publication date: 1-Feb-2007

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media