Sciweavers

772 search results - page 34 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
CACM
2005
126views more  CACM 2005»
13 years 7 months ago
Extrovert gadgets
This paper presents a set of architectures for the composition of ubiquitous computing applications. It describes research that is being carried out in "extrovert-Gadgets&quo...
Achilles Kameas, Irene Mavrommati
SACMAT
2004
ACM
14 years 1 months ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
PERCOM
2005
ACM
14 years 7 months ago
Communication Context for Adaptive Mobile Applications
This paper describes our ongoing work on a system that provides information about network resources and related communication facilities to applications running on a mobile device...
Arjan J. H. Peddemors, Henk Eertink, Ignas G. Niem...
SEUS
2008
IEEE
14 years 2 months ago
A Two-Layered Management Architecture for Building Adaptive Real-Time Systems
The concepts of Autonomic and Organic Computing (AC/OC) promise to make modern computer systems more secure and easier to manage. In this paper, we extend the observer/controller a...
Florian Kluge, Sascha Uhrig, Jörg Mische, The...
DRM
2006
Springer
13 years 11 months ago
Towards a secure and interoperable DRM architecture
In this paper we look at the problem of interoperability of digital rights management (DRM) systems in home networks. We introduce an intermediate module called the Domain Interop...
Gelareh Taban, Alvaro A. Cárdenas, Virgil D...