Exploiting Access Control Information in User Profiles to Reconfigure User Equipment

Giovanni Bartolomeo, Stefano Salsano, Nicola Blefari-Melazzi. Exploiting Access Control Information in User Profiles to Reconfigure User Equipment. In Hamid Ahmadi, Tom La Porta, editors, 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MOBIQUITOUS 2006, San Jose, California, USA, July 17-21, 2006. pages 1-8, IEEE Computer Society, 2006. [doi]

Abstract

Abstract is missing.