Location-Based Authentication and Authorization Using Smart Phones.
Feng ZhangAron KondoroSead MufticPublished in: TrustCom (2012)
Keyphrases
- smart phones
- mobile devices
- security requirements
- access control
- mobile phone
- trust negotiation
- location based services
- processing power
- security mechanisms
- mobile applications
- touch screen
- electronic devices
- identity management
- wifi
- tablet computers
- smart devices
- mobile platform
- mobile learning
- location aware
- handheld devices
- trust relationships
- context aware
- security policies
- mobile platforms
- android platform
- location information
- learning activities
- conflict resolution
- end to end
- access control policies
- higher education