A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices.
Thong-Yun TehYik-Shu LeeZi-Yik CheahJi-Jian ChinPublished in: ICITCS (2015)
Keyphrases
- access control
- smart devices
- smart phones
- embedded devices
- daily life
- ubiquitous computing
- dynamic access control
- data security
- mobile devices
- access control policies
- security policies
- role based access control
- context awareness
- smart environments
- security model
- security mechanisms
- database
- mobile phone
- security requirements
- signature scheme
- mobile computing
- data streams
- copyright protection
- video streaming
- mobile applications
- access control mechanism