Exploiting Access Control Information in User Profiles to Reconfigure User Equipment | IEEE Conference Publication | IEEE Xplore