Sciweavers

772 search results - page 56 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
ICPADS
2005
IEEE
14 years 1 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
ENTCS
2007
110views more  ENTCS 2007»
13 years 7 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 2 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
EUROSSC
2006
Springer
13 years 11 months ago
Discovery and Composition of Services for Context-Aware Systems
We consider the challenge of dynamically adapting services to context changes that occur in ubiquitous computing environments (e.g., changes in a user's activity) and propose ...
Cristian Hesselman, Andrew Tokmakoff, Pravin Pawar...
ESORICS
2008
Springer
13 years 9 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...