Back to Results
First PageMeta Content
Access control / Cryptographic protocols / Simple public key infrastructure / X.509 / Public key certificate / Authentication / PERMIS / Internet privacy / Authorization certificate / Cryptography / Public-key cryptography / Key management


Implementing Access Control to People Location Information Urs Hengartner† and Peter Steenkiste†‡ † Department of Computer Science ‡
Add to Reading List

Document Date: 2004-07-01 17:17:59


Open Document

File Size: 218,37 KB

Share Result on Facebook

City

Yorktown / New York / /

Company

People Locator service-Alice / Distributed Computing Systems / Microsoft / /

Country

United States / /

Currency

USD / /

/

Event

Reorganization / Company Expansion / Person Communication and Meetings / /

Facility

Helsinki University of Technology / Wean Hall / National Institute of Standards / Computer Engineering Carnegie Mellon University / NIST FIPS PUB / CMU Wean Hall / Doherty Hall / /

IndustryTerm

intermediate services / web applications / query processing / ubiquitous computing / location-specific services / web browser / low processing power / policy maker / step-by-step processing / transport protocol / location systems / ubiquitous computing environment / leaf location services / query processing time / similar processing / device / verification solution / particular technology / location services / certificate chain / wireless device / web server / computing / location technology / scarce computing resources / wireless devices / /

OperatingSystem

Linux / /

Organization

National Science Foundation / U.S. Department of Commerce / MIT / CMU’s School of Computer Science / SERVICE TRUST / Active Office / Helsinki University of Technology / Department of Computer Science / Department of Electrical / Laboratory for Theoretical Computer Science / National Institute of Standards / Carnegie Mellon University / Distributed Location Service / /

Person

Bob Alice / Peter Steenkiste / Adrian Perrig / Urs Hengartner / /

Position

administrator of the Wi-Fi service / administrator of the Device Locator service / administrator / extended role-based access control model for ubiquitous computing / Private / /

ProgrammingLanguage

Prolog / Java / XML / /

ProvinceOrState

New York / Manitoba / /

PublishedMedium

Theoretical Computer Science / /

Technology

XML / HTTP protocol / wireless devices / Linux / particular technology / GPS / 186 Technology / mobile phones / private key / Operating System / Operating Systems / Wi-Fi / SSH-like transport protocol / Encryption / cellular telephone / Cryptography / digital certificate / public key / Java / wireless device / Mobile Computing / one location technology / HTTP / caching / Digital Signature / web server / /

URL

ftp /

SocialTag