Sciweavers

223 search results - page 11 / 45
» A Trust-Based Access Control Model for Pervasive Computing A...
Sort
View
COLCOM
2005
IEEE
14 years 2 months ago
Distributed floor control protocols for computer collaborative applications on overlay networks
— Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications i...
Shankar M. Banik, Sridhar Radhakrishnan, Tao Zheng...
INAP
2001
Springer
14 years 1 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
SAC
2006
ACM
14 years 2 months ago
Making tuple spaces physical with RFID tags
In this paper, we describe the design and implementation of a tuple-based distributed memory realized with the use of RFID technology. The key idea – rooted in a more general sc...
Marco Mamei, Renzo Quaglieri, Franco Zambonelli
JNW
2006
94views more  JNW 2006»
13 years 8 months ago
An Efficient Role Specification Management Model for Highly Distributed Environments
Abstract--Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For ...
Soomi Yang
DSVIS
2008
Springer
13 years 10 months ago
ReWiRe: Designing Reactive Systems for Pervasive Environments
The design of interactive software that populates an ambient space is a complex and ad-hoc process with traditional software development approaches. In an ambient space, important ...
Geert Vanderhulst, Kris Luyten, Karin Coninx