Sciweavers

772 search results - page 107 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
COMCOM
2008
104views more  COMCOM 2008»
13 years 8 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
CASSIS
2005
Springer
14 years 2 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
RTCSA
2005
IEEE
14 years 2 months ago
On Building a Reflective Middleware Service for Location-Awareness
Location based services are becoming essential feature of context-awareness in ubiquitous computing. Reflective distribute component programming model is proposed to systematicall...
Uzair Ahmad, Uzma Nasir, Mahrin Iqbal, Young-Koo L...
PERCOM
2008
ACM
13 years 9 months ago
An Infrastructure for Developing Pervasive Learning Environments
This paper presents an infrastructure for developing problem-based pervasive learning environments. Building such environments necessitates having many autonomous components deali...
Sabine Graf, Kathryn MacCallum, Tzu-Chien Liu, Mai...
JVA
2006
IEEE
14 years 3 months ago
Programming Models for Grid Applications and Systems: Requirements and Approaches
History repeats itself. Since the invention of the programmable computer, numerous computer scientists keep dedicating their professional lives to the design of “the single, bes...
Thilo Kielmann