About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
MOBIQUITOUS 2006
IWASN 2006V2VCOM 2006IWUAC 2006PERNETS 2006
Other Years
Ethics and Malpractice Statement

    IWUAC

    1st International ICST Workshop on Ubiquitous Access Control

    The access to resources or services located in �foreign� environments and owned by disparate entities is a painful process for mobile users. This is a significant deterrent to the ability to easily interconnect in a secure and spontaneous manner among disparate organizations. In fact, corporate…

    The access to resources or services located in �foreign� environments and owned by disparate entities is a painful process for mobile users. This is a significant deterrent to the ability to easily interconnect in a secure and spontaneous manner among disparate organizations. In fact, corporate wireless networks are generally run with severe access policies that do not offer access to guests. Public wireless networks typically do not support roaming agreements, so that users have to be a customer of the specific network provider or to �instantly� (and costly) buy access.

    more »
    Editor(s): Hamid Ahmadi (Motorola) and Tom La Porta ( Penn State University)
    Publisher
    IEEE
    Conference dates
    17th Jul 2006
    Location
    San Jose, California, USA
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 IEEE

    Ordered by title or year
    Showing 1–9 of 9 results
    Page size: 102550
    • 1
    • A Novel Decentralized Hierarchical Access Control Scheme for the Medical Scenario

      Research Article in 1st International ICST Workshop on Ubiquitous Access Control

      Sigurd Eskeland, Neeli R. Prasad
    • Access Control and Authentication for Converged Wireless Networks

      Research Article in 1st International ICST Workshop on Ubiquitous Access Control

      Zhi Fu, John C. Strassner
    • Byzantine Generals Problem in the Light of P2P Computing

      Research Article in 1st International ICST Workshop on Ubiquitous Access Control

      Natalya Fedotova, Luca Veltri
    • Context-Aware Access Control Making Access Control Decisions Based on Context Information

      Research Article in 1st International ICST Workshop on Ubiquitous Access Control

      Sven Lachmund, Thomas Walter, Laurent Gomez, Laurent Bussard, Eddy Olk
    • Exploiting Access Control Information in User Profiles to Reconfigure User Equipment

      Research Article in 1st International ICST Workshop on Ubiquitous Access Control

      Giovanni Bartolomeo, Stefano Salsano, Nicola Blefari-Melazzi
    • LAAC: A Location-Aware Access Control Protocol

      Research Article in 1st International ICST Workshop on Ubiquitous Access Control

      YounSun Cho, Lichun Bao, Michael T. Goodrich
    • SIP roaming solution amongst different WLAN-based service providers

      Research Article in 1st International ICST Workshop on Ubiquitous Access Control

      Alessandro Ordine, Julian F. Gutierrez, Luca Veltri
    • Ubiquitous Access Control and Policy Management in Personal Networks

      Research Article in 1st International ICST Workshop on Ubiquitous Access Control

      Dimitris M. Kyriazanos, George I. Stassinopoulos, Neeli R. Prasad
    • Using semantic policies for ad-hoc coalition access control

      Research Article in 1st International ICST Workshop on Ubiquitous Access Control

      Anand Dersingh, Ramiro Liscano, Allan Jost
    • 1
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL