Sciweavers

772 search results - page 31 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
APSCC
2008
IEEE
14 years 2 months ago
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures
Software systems today often run in malicious environments in which attacks or intrusions are quite common. This situation has brought security concerns into the development of so...
Yanguo Liu, Issa Traoré, Alexander M. Hoole
EUC
2004
Springer
14 years 1 months ago
Securing Communications in the Smart Home
As the vision of ubiquitous computing becomes reality smart devices are embedded into our surroundings and domestic appliances providing services transparently. The nature of such ...
Patroklos G. Argyroudis, Donal O'Mahony
FGCN
2008
IEEE
152views Communications» more  FGCN 2008»
13 years 9 months ago
Extending the UbiMDR Supporting Situation-Aware Access Control
Ubiquitous computing environment requirement needs information sharing of sensors based on sensor network technology, situation-aware and determination functions and other related...
Jeong-Dong Kim, Dongwon Jeong, Doo-Kwon Baik
COBUILD
1998
Springer
14 years 2 days ago
Multiple-Computer User Interfaces: A Cooperative Environment Consisting of Multiple Digital Devices
Traditional graphical user interfaces (GUIs) are mainly designed for an environment consisting of a single display and a set of single input devices. However, in the near future we...
Jun Rekimoto
FTDB
2007
95views more  FTDB 2007»
13 years 7 months ago
Architecture of a Database System
Database Management Systems (DBMSs) are a ubiquitous and critical component of modern computing, and the result of decades of research and development in both academia and industr...
Joseph M. Hellerstein, Michael Stonebraker, James ...