Sciweavers

1688 search results - page 32 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
ESORICS
2008
Springer
13 years 10 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
VTC
2007
IEEE
135views Communications» more  VTC 2007»
14 years 2 months ago
Spontaneous and Context-Aware Media Recommendation in Heterogeneous Spaces
—While mobile users move from one smart space to another, it is highly desirable for them to access the right media contents from the overabundant media information in the right ...
Daqing Zhang, Zhiwen Yu
SACMAT
2003
ACM
14 years 1 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
AINA
2007
IEEE
14 years 3 months ago
Pervasive Computing with Frugal Objects
— This paper presents a computing model for resource-limited mobile devices that might be ubiquitously deployed in private and business environments. The model integrates a stron...
Benoît Garbinato, Rachid Guerraoui, Jarle Hu...
MIDDLEWARE
2005
Springer
14 years 2 months ago
Improving flexibility on host discovery for pervasive computing middlewares
The vision of pervasive or ubiquitous computing, conceived by Mark Weiser, foresees a world where computing is embedded in every day objects. Such objects interact with each other...
Emerson Loureiro, Loreno Oliveira, Hyggo Oliveira ...