Sciweavers

1688 search results - page 8 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
CONTEXT
2003
Springer
14 years 21 days ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...
IWCMC
2010
ACM
13 years 9 months ago
Decentralized service composition in pervasive computing environments
In a pervasive computing environment, the devices are embedded in the physical world, providing services and interconnected by a communication network. Composition of these servic...
Joanna Izabela Siebert, Jiannong Cao, Long Cheng, ...
MOBILWARE
2009
ACM
14 years 2 months ago
A Quality of Context-Aware Approach to Access Control in Pervasive Environments
Alessandra Toninelli, Antonio Corradi, Rebecca Mon...
WICOMM
2008
61views more  WICOMM 2008»
13 years 7 months ago
Pervasive data access in wireless and mobile computing environments
Ken C. K. Lee, Wang-Chien Lee, Sanjay Kumar Madria
BIOWIRE
2007
Springer
14 years 1 months ago
Field-Based Coordination for Pervasive Computing Applications
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
Marco Mamei, Franco Zambonelli