Sciweavers

772 search results - page 75 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
POLICY
2009
Springer
14 years 3 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
SACMAT
2004
ACM
14 years 2 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
PEWASUN
2005
ACM
14 years 2 months ago
Real-time perceptual QoS satisfactions of multimedia information
Multimedia contents are becoming the major information going through the Internet. Pervasive network infrastructure expedites data delivery with improved network throughput and re...
Ka Lun Eddie Law, Sunny So
ISSRE
2002
IEEE
14 years 2 months ago
A Flexible Generator Architecture for Improving Software Dependability
Improving the dependability of computer systems is increasingly important as more and more of our lives depend on the availability of such systems. Wrapping dynamic link libraries...
Christof Fetzer, Zhen Xiao
SIGOPS
2008
120views more  SIGOPS 2008»
13 years 9 months ago
TVDc: managing security in the trusted virtual datacenter
Virtualization technology is becoming increasingly common in datacenters, since it allows for collocation of multiple workloads, consisting of operating systems, middleware and ap...
Stefan Berger, Ramón Cáceres, Dimitr...