Sciweavers

579 search results - page 17 / 116
» Access control management for ubiquitous computing
Sort
View
CCS
2007
ACM
14 years 1 days ago
Efficient techniques for realizing geo-spatial access control
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
ICECCS
2008
IEEE
168views Hardware» more  ICECCS 2008»
14 years 2 months ago
Ubiquitous Service Regulation Based on Dynamic Rules
Ubiquitous computing systems can be regarded as open systems where heterogeneous and previously unknown entities may spontaneously interact, due to intrinsic mobility of users and...
José Viterbo Filho, Markus Endler, Jean-Pie...
SOUPS
2009
ACM
14 years 2 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
JUCS
2010
135views more  JUCS 2010»
13 years 6 months ago
A Service-Oriented Platform for Ubiquitous Personalized Multimedia Provisioning
: As multimedia contents are becoming widely used in ubiquitous computing environments among many application fields, e.g., education, entertainment, and live surveillance, the dem...
Zhiwen Yu, Changde Li, Xingshe Zhou, Haipeng Wang
WWW
2006
ACM
14 years 8 months ago
Using semantic rules to determine access control for web services
Semantic Web technologies are bring increasingly employed to solve knowledge management issues in traditional Web technologies. This paper follows that trend and proposes using Se...
Brian Shields, Owen Molloy, Gerard Lyons, Jim Dugg...