Sciweavers

2358 search results - page 12 / 472
» A Secure Pervasive Environment
Sort
View
IJSN
2006
124views more  IJSN 2006»
13 years 7 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
CSREASAM
2008
13 years 9 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
CONTEXT
2003
Springer
14 years 23 days ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...
CISIS
2009
IEEE
14 years 2 months ago
A Parameter-Based Scheme for Service Composition in Pervasive Computing Environment
Pervasive computing, the new computing paradigm aiming at providing services anywhere at anytime, poses great challenges on dynamic service composition. Existing service compositi...
Zhenghui Wang, Tianyin Xu, Zhuzhong Qian, Sanglu L...
SOCO
2005
Springer
14 years 1 months ago
Ad Hoc Composition of User Tasks in Pervasive Computing Environments
Due to the large success of wireless networks and portable devices, the pervasive computing paradigm is becoming a reality. One of the most challenging objectives to be achieved in...
Sonia Ben Mokhtar, Nikolaos Georgantas, Valé...