Exploiting Access Control Information in User Profiles to Reconfigure User Equipment

Giovanni Bartolomeo, Stefano Salsano, Nicola Blefari-Melazzi. Exploiting Access Control Information in User Profiles to Reconfigure User Equipment. In Hamid Ahmadi, Tom La Porta, editors, 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MOBIQUITOUS 2006, San Jose, California, USA, July 17-21, 2006. pages 1-8, IEEE Computer Society, 2006. [doi]

Authors

Giovanni Bartolomeo

This author has not been identified. Look up 'Giovanni Bartolomeo' in Google

Stefano Salsano

This author has not been identified. It may be one of the following persons: Look up 'Stefano Salsano' in Google

Nicola Blefari-Melazzi

This author has not been identified. Look up 'Nicola Blefari-Melazzi' in Google