Sciweavers

1688 search results - page 47 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
ICDIM
2010
IEEE
13 years 6 months ago
Risk management in dynamic role based access control systems
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk...
Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski
PERCOM
2010
ACM
13 years 7 months ago
ReSCo: A middleware component for Reliable Service Composition in pervasive systems
Abstract—Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as th...
Brent Lagesse, Mohan Kumar, Matthew Wright
MIDDLEWARE
2009
Springer
14 years 3 months ago
Middleware for Pervasive Spaces: Balancing Privacy and Utility
Abstract. Middleware for pervasive spaces has to meet conflicting requirements. It has to both maximize the utility of the information exposed and ensure that this information doe...
Daniel Massaguer, Bijit Hore, Mamadou H. Diallo, S...
PERVASIVE
2004
Springer
14 years 2 months ago
Accommodating Transient Connectivity in Ad Hoc and Mobile Settings
Much of the work on networking and communications is based on the premise that components interact in one of two ways: either they are connected via a stable wired or wireless netw...
Radu Handorean, Christopher D. Gill, Gruia-Catalin...
PERCOM
2009
ACM
14 years 3 months ago
A High-Performance Remote Computing Platform
— The pervasive computing environment and the wide network bandwidth provide users more opportunities to utilize remote computing resources. In this paper, we introduce a highper...
Huifeng Shen, Yan Lu, Feng Wu, Shipeng Li