Sciweavers

1688 search results - page 33 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
SACMAT
2005
ACM
14 years 2 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
IEEEIAS
2007
IEEE
14 years 2 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang
WMTE
2005
IEEE
14 years 2 months ago
Supporting Pervasive Learning Environments: Adaptability and Context Awareness in Mobile Learning
In the mobile learning context, it is helpful to consider context awareness and adaptivity as two sides of the same coin. The purpose of the adaptivity and context awareness is to...
Antti Syvänen, Russell Beale, Mike Sharples, ...
FGR
2008
IEEE
227views Biometrics» more  FGR 2008»
14 years 3 months ago
Ambient intelligence as the bridge to the future of pervasive computing
One prediction about this future of pervasive technology is that people will carry the tools needed to interface with technological resources sprinkled through out the environment...
Christopher Richard Wren, Yuri A. Ivanov
TISSEC
2010
121views more  TISSEC 2010»
13 years 7 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...