Sciweavers

575 search results - page 12 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
DATE
2007
IEEE
73views Hardware» more  DATE 2007»
14 years 1 months ago
Design methods for security and trust
The design of ubiquitous and embedded computers focuses on cost factors such as area, power-consumption, and performance. Security and trust properties, on the other hand, are oft...
Ingrid Verbauwhede, Patrick Schaumont
PERVASIVE
2011
Springer
12 years 10 months ago
NextPlace: A Spatio-temporal Prediction Framework for Pervasive Systems
Abstract. Accurate and fine-grained prediction of future user location and geographical profile has interesting and promising applications including targeted content service, adv...
Salvatore Scellato, Mirco Musolesi, Cecilia Mascol...
POLICY
2005
Springer
14 years 1 months ago
Relationship-Driven Policy Engineering for Autonomic Organisations
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based go...
Kevin Feeney, Karl Quinn, David Lewis, Declan O'Su...
ITRUST
2004
Springer
14 years 1 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...
SCAM
2005
IEEE
14 years 1 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich