Sciweavers

2358 search results - page 13 / 472
» A Secure Pervasive Environment
Sort
View
SUTC
2008
IEEE
14 years 1 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
ICAC
2007
IEEE
14 years 1 months ago
An Autonomic Service Discovery Mechanism to Support Pervasive Device Accessing Semantic Grid
An important challenge of integrating pervasive devices into Grid environment to enhance pervasive device capabilities is that pervasive devices need to locate, find, select and ...
Tao Guan, Ed Zaluska, David De Roure
JNW
2006
94views more  JNW 2006»
13 years 7 months ago
An Efficient Role Specification Management Model for Highly Distributed Environments
Abstract--Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For ...
Soomi Yang
EUROPAR
2003
Springer
14 years 23 days ago
Short Message Service in a Grid-Enabled Computing Environment
Pervasive computing provides an attractive vision for the future of computing. Mobile computing devices such as mobile phones together with a land-based and wireless communication ...
Fenglian Xu, M. Hakki Eres, Simon J. Cox
PERCOM
2004
ACM
14 years 7 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles