Sciweavers

2358 search results - page 21 / 472
» A Secure Pervasive Environment
Sort
View
AINA
2009
IEEE
14 years 2 months ago
Quality Aware Context Information Aggregation System for Pervasive Environments
Sensing context information and making it available to the people, involved in coordinating a collaborative task, is a preliminary phase in making a system adaptable to the prevai...
Atif Manzoor, Hong Linh Truong, Schahram Dustdar
ACSW
2004
13 years 9 months ago
A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios
This paper examines the security aspects of different pervasive scenarios involving agent communities evolved using multi agent systems (MAS). It describes the motivation and the ...
John Page, Arkady B. Zaslavsky, Maria Indrawan
PERVASIVE
2005
Springer
14 years 1 months ago
Simultaneous Tracking and Activity Recognition (STAR) Using Many Anonymous, Binary Sensors
Abstract. In this paper we introduce the simultaneous tracking and activity recognition (STAR) problem, which exploits the synergy between location and activity to provide the info...
D. H. Wilson, Christopher G. Atkeson
CCS
2008
ACM
13 years 9 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
AINA
2007
IEEE
14 years 1 months ago
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients
We propose a four-party password authenticated interdomain key exchange protocol which makes use of properties of identity-based cryptography and secret public keys. Being passwor...
Ford-Long Wong, Hoon Wei Lim