Sciweavers

1688 search results - page 9 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
JCP
2008
120views more  JCP 2008»
13 years 7 months ago
Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment
The computer world is experiencing a paradigm shift towards context-aware pervasive computing, where diverse computer devices communicate with each other through different network ...
Letian Rong
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 9 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
SACMAT
2010
ACM
13 years 5 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
CISIS
2009
IEEE
14 years 2 months ago
A Parameter-Based Scheme for Service Composition in Pervasive Computing Environment
Pervasive computing, the new computing paradigm aiming at providing services anywhere at anytime, poses great challenges on dynamic service composition. Existing service compositi...
Zhenghui Wang, Tianyin Xu, Zhuzhong Qian, Sanglu L...
PERCOM
2003
ACM
14 years 7 months ago
BASE - A Micro-Broker-Based Middleware for Pervasive Computing
Pervasive computing environments add a multitude of additional devices to our current computing landscapes. Specialized embedded systems provide sensor information about the real ...
Christian Becker, Gregor Schiele, Holger Gubbels, ...