Digital Video Broadcasting (DVB): The International Standard for Digital Television
Digital Video Broadcasting (DVB): The International Standard for Digital Television
Digital Rights Management: Business and Technology
Digital Rights Management: Business and Technology
A Survey of Encryption Standards
IEEE Micro
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
PKI and Digital Certification Infrastructure
ICON '01 Proceedings of the 9th IEEE International Conference on Networks
Security and Privacy in Digital Rights Management
Security and Privacy in Digital Rights Management
Challenge: ubiquitous location-aware computing and the "place lab" initiative
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Bayesian Based Location Estimation System Using Wireless LAN
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Location Dependent Digital Rights Management
ISCC '05 Proceedings of the 10th IEEE Symposium on Computers and Communications
Location constraints in digital rights management
Computer Communications
PorKI: portable PKI credentials via proxy certificates
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Hi-index | 0.00 |
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept and two architectures for location dependent access control. We start with a number of scenarios. Some of the scenarios play in a global context, some others in a more local environment. We address boths groups of scenarios with different methods of positioning (location providers). We are using a WLAN mesh network to determine the nodes' positions. We introduce a trustworthy hardware module used for positioning and controlling access to secured data. We show different types of attacks against such systems. Due to the special nature of different location providers we compare several ways how these attacks are impeded