Location-Aware Authorization Scheme for Emergency Response

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-aware scheme for privacy-preserving location-based services

1389-1286/$ see front matter 2012 Elsevier B.V http://dx.doi.org/10.1016/j.comnet.2012.03.022 ⇑ Corresponding author. E-mail addresses: [email protected] (A. Pingle (W. Yu), [email protected] (N. Zhang), xinwenfu [email protected] (W. Zhao). We address issues related to privacy protection in location-based services (LBSs). Most existing privacy-preserving LBS techniques either require a trusted thi...

متن کامل

Efficient Location-aware Replication Scheme for Reliable Group Communication Applications

In this paper, we present an efficient replication scheme designed to provide scalable and reliable group communication services for end system nodes that are widely dispersed in the network. This scheme is highlighted with three features. First, it employs both remote and neighbor replicas and intelligently avoids the services from interruptions while keeping replication cost low. Second, by u...

متن کامل

Implicit Authorization for Social Location Disclosure

Being increasingly equipped with highly-accurate positioning technologies, today’s mobile phones enable their owners to transmit their current position over the cellular network and share it with others. So-called location-based community services make use of this possibility, for example for locating friends, co-workers or family members. Of course, these services give target persons control a...

متن کامل

Location and Routing Models for Emergency Response Plans with Priorities

In emergency planning, consideration of emergency priorities is a necessity. This paper presents new formulations of the facility location problem (FLP) and vehicle routing problem with time windows (VRPTW) with considerations of priority. Our models ensure that higher priority locations are considered before the lower priority ones, for both facility and routing decisions. The FLP is solved us...

متن کامل

Position Paper: Privacy-Aware Proof-Carrying Authorization

Proof-carrying authorization (PCA) is one of the most popular approaches for the enforcement of access control policies. In a nutshell, the idea is to formalize a policy as a set of logical rules and to let the requester construct a formal proof showing that she has permissions to access the desired resource according to the provider’s policy. This policy may depend on logical formulas that are...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2016

ISSN: 2169-3536

DOI: 10.1109/access.2016.2601442