One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
This paper studies the use of a Bluetooth enabled mobile phone as a controlling device in a smart environment. Main focus for the work is partitioning of the functionality and the...
In dynamic heterogeneous environments, such as Pervasive Computing, context-aware adaptation is a key concept to meet the varying requirements of different clients. To enable such...
As enterprises seek to engage in increasingly rich and agile forms of collaboration, they are turning towards service-oriented architectures that enable them to selectively expose...
People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many r...
Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih L...