Sciweavers

2358 search results - page 14 / 472
» A Secure Pervasive Environment
Sort
View
107
Voted
CISIS
2009
IEEE
15 years 10 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
141
Voted
IEEECIT
2010
IEEE
15 years 2 months ago
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Ruan He, Marc Lacoste, Jean Leneutre
ISEM
2006
112views more  ISEM 2006»
15 years 3 months ago
Ubiquitous computing: connecting Pervasive computing through Semantic Web
Ubiquitous computing refers to building a global computing environment where seamless and invisible access to computing resources is provided to the user. Pervasive computing deal...
Sachin Singh, Sushil Puradkar, Yugyung Lee
104
Voted
OTM
2005
Springer
15 years 9 months ago
A Model of Pervasive Services for Service Composition
We propose a formal definition of a pervasive service model targeting the very dynamic environments typical of mobile application scenarios. The model is based on a requirement an...
Caroline Funk, Christoph Kuhmünch, Christoph ...
113
Voted
EDBT
2010
ACM
147views Database» more  EDBT 2010»
15 years 10 months ago
A simple (yet powerful) algebra for pervasive environments
Querying non-conventional data is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is the ability to qu...
Yann Gripay, Frédérique Laforest, Je...