Location-Aware Authorization Scheme for Emergency Response
نویسندگان
چکیده
منابع مشابه
A context-aware scheme for privacy-preserving location-based services
1389-1286/$ see front matter 2012 Elsevier B.V http://dx.doi.org/10.1016/j.comnet.2012.03.022 ⇑ Corresponding author. E-mail addresses: [email protected] (A. Pingle (W. Yu), [email protected] (N. Zhang), xinwenfu [email protected] (W. Zhao). We address issues related to privacy protection in location-based services (LBSs). Most existing privacy-preserving LBS techniques either require a trusted thi...
متن کاملEfficient Location-aware Replication Scheme for Reliable Group Communication Applications
In this paper, we present an efficient replication scheme designed to provide scalable and reliable group communication services for end system nodes that are widely dispersed in the network. This scheme is highlighted with three features. First, it employs both remote and neighbor replicas and intelligently avoids the services from interruptions while keeping replication cost low. Second, by u...
متن کاملImplicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today’s mobile phones enable their owners to transmit their current position over the cellular network and share it with others. So-called location-based community services make use of this possibility, for example for locating friends, co-workers or family members. Of course, these services give target persons control a...
متن کاملLocation and Routing Models for Emergency Response Plans with Priorities
In emergency planning, consideration of emergency priorities is a necessity. This paper presents new formulations of the facility location problem (FLP) and vehicle routing problem with time windows (VRPTW) with considerations of priority. Our models ensure that higher priority locations are considered before the lower priority ones, for both facility and routing decisions. The FLP is solved us...
متن کاملPosition Paper: Privacy-Aware Proof-Carrying Authorization
Proof-carrying authorization (PCA) is one of the most popular approaches for the enforcement of access control policies. In a nutshell, the idea is to formalize a policy as a set of logical rules and to let the requester construct a formal proof showing that she has permissions to access the desired resource according to the provider’s policy. This policy may depend on logical formulas that are...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2016
ISSN: 2169-3536
DOI: 10.1109/access.2016.2601442