Sciweavers

1688 search results - page 13 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
DSL
2009
13 years 6 months ago
A Taxonomy-Driven Approach to Visually Prototyping Pervasive Computing Applications
Abstract. Various forms of pervasive computing environments are being deployed in an increasing number of areas including healthcare, home automation, and military. This evolution ...
Zoé Drey, Julien Mercadal, Charles Consel
ITICSE
2005
ACM
14 years 2 months ago
Providing students universal access to a centralized, graphical computing environment
We investigate the use of a thin-client based configuration in providing students with universal access to a centralized, graphical computing environment. The primary goal is to ...
Michael H. Goldwasser, David Letscher
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 10 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
E4MAS
2005
Springer
14 years 2 months ago
Augmenting the Physical Environment Through Embedded Wireless Technologies
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
Marco Mamei, Franco Zambonelli
IEEECIT
2006
IEEE
14 years 2 months ago
Extending Pervasive Devices with the Semantic Grid: A Service Infrastructure Approach
Pervasive computing devices are gradually becoming increasingly prevalent in our everyday life, enabling the users in the physical world to interact with the digital world. Grid c...
Tao Guan, Ed Zaluska, David De Roure