Sciweavers

2358 search results - page 106 / 472
» A Secure Pervasive Environment
Sort
View
JUCS
2006
86views more  JUCS 2006»
13 years 9 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...
NORDICHI
2004
ACM
14 years 2 months ago
Wolves, football, and ambient computing: facilitating collaboration in problem solving systems through the study of human and an
This paper describes how computer-human interaction in ambient computing environments can be best informed by conceptualizing of such environments as problem solving systems. Typi...
David W. Eccles, Paul T. Groth
ICIW
2007
IEEE
14 years 3 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
SAC
2006
ACM
14 years 2 months ago
Bootstrapping multi-party ad-hoc security
Increasingly pervasive computing throws up scenarios where users may wish to achieve some degree of security in their interaction with other people or equipment, in contexts where...
Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming...
INTERACT
2007
13 years 10 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...