Sciweavers

2358 search results - page 69 / 472
» A Secure Pervasive Environment
Sort
View
WOWMOM
2005
ACM
86views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
The Wireless Opaque Channel to Contrast Information Leakage
Widespread adoption of wireless devices has considerably enlarged the domain of user applications, but consequently specific issues related to a secure use of these devices arise...
Marco Domenico Aime, Andrea S. Atzeni, Antonio Lio...
PERCOM
2007
ACM
14 years 8 months ago
Expressing Sensor Network Interaction Patterns Using Data-Driven Macroprogramming
Wireless Sensor Networks (WSNs) are increasingly being employed as a key building block of pervasive computing infrastructures, owing to their ability to be embedded within the re...
Animesh Pathak, Luca Mottola, Amol Bakshi, Viktor ...
PERVASIVE
2005
Springer
14 years 2 months ago
Collaborative Sensing in a Retail Store Using Synchronous Distributed Jam Signalling
The retail store environment is a challenging application area for Pervasive Computing technologies. It has demanding base conditions due to the number and complexity of the interd...
Albert Krohn, Tobias Zimmer, Michael Beigl, Christ...
ICDIM
2007
IEEE
14 years 3 months ago
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC
: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Kiyeal Lee, Seokhwan Yang, Sungik Jun, Mokdong Chu...
SERVICES
2010
130views more  SERVICES 2010»
13 years 10 months ago
Heterogeneous Service Selection Based on Formal Concept Analysis
In this paper, we propose an approach based on Formal Concept Analysis in order to organize the services registry at runtime and to allow the "best" service selection am...
Stéphanie Chollet, Vincent Lestideau, Phili...