Sciweavers

772 search results - page 74 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
ICTCS
2005
Springer
14 years 2 months ago
A Typed Assembly Language for Non-interference
Abstract. Non-interference is a desirable property of systems in a multilevel security architecture, stating that confidential information is not disclosed in public output. The c...
Ricardo Medel, Adriana B. Compagnoni, Eduardo Bone...
MOBIQUITOUS
2008
IEEE
14 years 3 months ago
ScreenSpot: multidimensional resource discovery for distributed applications in smart spaces
The big challenge related to the contemporary research on ubiquitous and pervasive computing is that of seamless integration. For the next generation of ubiquitous and distributed...
Marko Jurmu, Sebastian Boring, Jukka Riekki
WMTE
2006
IEEE
14 years 3 months ago
Mobile Web Services for Collaborative Learning
Since learning nowadays is conceptualized as a social system within communities of practice, the best way to learn is with others, in groups. In the past few years, there has been...
Mohamed Amine Chatti, Satish Narayana Srirama, Dav...
SAINT
2008
IEEE
14 years 3 months ago
Distributed Sensor Information Management Architecture Based on Semantic Analysis of Sensing Data
In the ubiquitous computing environment, we believe that P2P-based context-aware application utilizing sensing data is important. However, since sensors are not placed under the c...
Tomoya Kawakami, Bich Lam Ngoc Ly, Susumu Takeuchi...
IEEEARES
2007
IEEE
14 years 3 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer