Sciweavers

1688 search results - page 47 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
165
Voted
ICDIM
2010
IEEE
15 years 2 months ago
Risk management in dynamic role based access control systems
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk...
Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski
174
Voted
PERCOM
2010
ACM
15 years 3 months ago
ReSCo: A middleware component for Reliable Service Composition in pervasive systems
Abstract—Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as th...
Brent Lagesse, Mohan Kumar, Matthew Wright
MIDDLEWARE
2009
Springer
15 years 11 months ago
Middleware for Pervasive Spaces: Balancing Privacy and Utility
Abstract. Middleware for pervasive spaces has to meet conflicting requirements. It has to both maximize the utility of the information exposed and ensure that this information doe...
Daniel Massaguer, Bijit Hore, Mamadou H. Diallo, S...
PERVASIVE
2004
Springer
15 years 10 months ago
Accommodating Transient Connectivity in Ad Hoc and Mobile Settings
Much of the work on networking and communications is based on the premise that components interact in one of two ways: either they are connected via a stable wired or wireless netw...
Radu Handorean, Christopher D. Gill, Gruia-Catalin...
150
Voted
PERCOM
2009
ACM
15 years 11 months ago
A High-Performance Remote Computing Platform
— The pervasive computing environment and the wide network bandwidth provide users more opportunities to utilize remote computing resources. In this paper, we introduce a highper...
Huifeng Shen, Yan Lu, Feng Wu, Shipeng Li