Sciweavers

575 search results - page 16 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
SAC
2003
ACM
14 years 27 days ago
Designing and Specifying Mobility within the Multiagent Systems Engineering Methodology
Recently, researchers have created many platforms and applications for mobile agents; however, current Agent-Oriented Software Engineering (AOSE) methodologies have yet not fully ...
Athie L. Self, Scott A. DeLoach
MOBISYS
2007
ACM
14 years 7 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
FASE
2003
Springer
14 years 26 days ago
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...
David Scott, Alastair R. Beresford, Alan Mycroft
CCS
2009
ACM
14 years 2 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
CORR
2008
Springer
114views Education» more  CORR 2008»
13 years 7 months ago
Modeling Time in Computing: A Taxonomy and a Comparative Survey
The increasing relevance of areas such as real-time and embedded systems, pervasive computing, hybrid systems control, and biological and social systems modeling is bringing a gro...
Carlo A. Furia, Dino Mandrioli, Angelo Morzenti, M...