Sciweavers

1688 search results - page 84 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
PERCOM
2007
ACM
16 years 4 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
ISMIS
2003
Springer
15 years 9 months ago
Enacting an Agent-Based Digital Self in a 24x7 Web Services World
As broadband access to the Internet becomes pervasive, the need for a 24 hours a day, seven days a week (24x7) interface within the client devices, requires a level of sophisticati...
Steve Goschnick
TES
2000
Springer
15 years 8 months ago
Web Services and Information Delivery for Diverse Environments
There is a growing need for techniques that provide alternative means to access Web content and services, be it the ability to browse the Web through a voice interface like the Ph...
Juliana Freire, Bharat Kumar
PPL
2008
88views more  PPL 2008»
15 years 4 months ago
Evaluating Computational Costs while Handling Data and Control Parallelism
The aim of this work is to introduce a computational costs system associated to a semantic framework for orthogonal data and control parallelism handling. In such a framework a pa...
Sonia Campa
POLICY
2005
Springer
15 years 10 months ago
Automated Decomposition of Access Control Policies
Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The s may be considered as a ...
Linying Su, David W. Chadwick, Andrew Basden, Jame...