Sciweavers

1688 search results - page 31 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 3 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
PERVASIVE
2005
Springer
14 years 2 months ago
Task Partitioning in Smart Environments
This paper studies the use of a Bluetooth enabled mobile phone as a controlling device in a smart environment. Main focus for the work is partitioning of the functionality and the...
Markus Ritala, Jukka Vanhala
PERCOM
2004
ACM
14 years 8 months ago
Comprehensive Structured Context Profiles (CSCP): Design and Experiences
In dynamic heterogeneous environments, such as Pervasive Computing, context-aware adaptation is a key concept to meet the varying requirements of different clients. To enable such...
Sven Buchholz, Thomas Hamann, Gerald Hübsch
ICDE
2007
IEEE
166views Database» more  ICDE 2007»
14 years 3 months ago
Enforcing Context-Sensitive Policies in Collaborative Business Environments
As enterprises seek to engage in increasingly rich and agile forms of collaboration, they are turning towards service-oriented architectures that enable them to selectively expose...
Alberto Sardinha, Jinghai Rao, Norman M. Sadeh
COMCOM
2008
82views more  COMCOM 2008»
13 years 8 months ago
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many r...
Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih L...