Sciweavers

223 search results - page 12 / 45
» A Trust-Based Access Control Model for Pervasive Computing A...
Sort
View
SACMAT
2006
ACM
14 years 2 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
MM
2005
ACM
219views Multimedia» more  MM 2005»
14 years 2 months ago
Pervasive views: area exploration and guidance using extended image media
This work achieves full registration of scenes in a large area and creates visual indexes for visualization in a digital city. We explore effective mapping, indexing, and display ...
Jiang Yu Zheng, Xiaolong Wang
SACMAT
2010
ACM
14 years 1 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
PERCOM
2009
ACM
14 years 3 months ago
A High-Performance Remote Computing Platform
— The pervasive computing environment and the wide network bandwidth provide users more opportunities to utilize remote computing resources. In this paper, we introduce a highper...
Huifeng Shen, Yan Lu, Feng Wu, Shipeng Li
VEE
2005
ACM
130views Virtualization» more  VEE 2005»
14 years 2 months ago
The entropia virtual machine for desktop grids
Desktop distributed computing allows companies to exploit the idle cycles on pervasive desktop PC systems to increase the available computing power by orders of magnitude (10x - 1...
Brad Calder, Andrew A. Chien, Ju Wang, Don Yang