Sciweavers

1688 search results - page 59 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
WMCSA
2003
IEEE
14 years 2 months ago
Proximity Mining: Finding Proximity using Sensor Data History
Emerging ubiquitous and pervasive computing applications often need to know where things are physically located. To meet this need, many locationsensing systems have been develope...
Toshihiro Takada, Satoshi Kurihara, Toshio Hirotsu...
GI
2005
Springer
14 years 2 months ago
The Role of Semantic Locations for Mobile Information Access
: The concept of symbolic or semantic locations significantly simplifies the development of several applications that access location information in mobile scenarios. This paper mo...
Jörg Roth
HCI
2001
13 years 10 months ago
Distributed user modelling for universal information access
In a distributed multi-agent based software environment, the traditional monolithic user model ceases to exist and is replaced by user model fragments, developed by the various so...
Julita Vassileva
EMISA
2009
Springer
14 years 3 months ago
Access Control for Monitoring System-Spanning Business Processes in Proviado
: Integrated process support is highly desirable in environments where data related to a particular (business) process are scattered over distributed, heterogeneous information sys...
Sarita Bassil, Manfred Reichert, Ralph Bobrik
POLICY
2004
Springer
14 years 2 months ago
RSVP Policy Control using XACML
This work proposes a XML-based framework for distributing and enforcing RSVP access control policies, for RSVP-aware application servers. Policies are represented by extending XAC...
Emir Toktar, Edgard Jamhour, Carlos Maziero