Sciweavers

223 search results - page 22 / 45
» A Trust-Based Access Control Model for Pervasive Computing A...
Sort
View
MOBISYS
2007
ACM
14 years 7 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
ACSAC
2000
IEEE
13 years 12 months ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
WSC
1998
13 years 8 months ago
Parallel Simulation for Aviation Applications
The Detailed Policy Assessment Tool (DPAT) is a widely used simulation of air traffic control that incorporates advanced technology for user-friendly operation. DPAT computes cong...
Frederick Wieland
MTA
2011
220views Hardware» more  MTA 2011»
13 years 2 months ago
Modeling, simulation, and practice of floor control for synchronous and ubiquitous collaboration
: With the advances in a variety of software/hardware technologies and wireless networking, there is coming a need for ubiquitous collaboration which allows people to access inform...
Kangseok Kim, Geoffrey C. Fox
MOBIQUITOUS
2008
IEEE
14 years 1 months ago
ScreenSpot: multidimensional resource discovery for distributed applications in smart spaces
The big challenge related to the contemporary research on ubiquitous and pervasive computing is that of seamless integration. For the next generation of ubiquitous and distributed...
Marko Jurmu, Sebastian Boring, Jukka Riekki