Sciweavers

2358 search results - page 14 / 472
» A Secure Pervasive Environment
Sort
View
CISIS
2009
IEEE
14 years 2 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
IEEECIT
2010
IEEE
13 years 6 months ago
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Ruan He, Marc Lacoste, Jean Leneutre
ISEM
2006
112views more  ISEM 2006»
13 years 7 months ago
Ubiquitous computing: connecting Pervasive computing through Semantic Web
Ubiquitous computing refers to building a global computing environment where seamless and invisible access to computing resources is provided to the user. Pervasive computing deal...
Sachin Singh, Sushil Puradkar, Yugyung Lee
OTM
2005
Springer
14 years 1 months ago
A Model of Pervasive Services for Service Composition
We propose a formal definition of a pervasive service model targeting the very dynamic environments typical of mobile application scenarios. The model is based on a requirement an...
Caroline Funk, Christoph Kuhmünch, Christoph ...
EDBT
2010
ACM
147views Database» more  EDBT 2010»
14 years 2 months ago
A simple (yet powerful) algebra for pervasive environments
Querying non-conventional data is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is the ability to qu...
Yann Gripay, Frédérique Laforest, Je...