Sciweavers

1688 search results - page 70 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
TCS
2008
15 years 4 months ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
PDP
2008
IEEE
15 years 11 months ago
CoDaMine: Communication Data Mining for Feedback and Control in Ubiquitous Environments
In ubiquitous environments an increasing number of sensors capture information on users and an increasing number of actuators present information to users. In this paper we presen...
Tom Gross, Mirko Fetter
VEE
2005
ACM
130views Virtualization» more  VEE 2005»
15 years 10 months ago
The entropia virtual machine for desktop grids
Desktop distributed computing allows companies to exploit the idle cycles on pervasive desktop PC systems to increase the available computing power by orders of magnitude (10x - 1...
Brad Calder, Andrew A. Chien, Ju Wang, Don Yang
ACSAC
1999
IEEE
15 years 8 months ago
A Resource Access Decision Service for CORBA-Based Distributed Systems
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and...
Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt...
PERVASIVE
2007
Springer
15 years 4 months ago
Mobile Social Software: Facilitating Serendipity or Encouraging Homogeneity?
Mobile social software is currently designed and conceived to afford serendipitous social interactions in densely populated urban environments. In this paper, I argue that these s...
Jennifer Thom-Santelli