Sciweavers

579 search results - page 7 / 116
» Access control management for ubiquitous computing
Sort
View
PET
2004
Springer
14 years 1 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
SIGMOD
2004
ACM
101views Database» more  SIGMOD 2004»
14 years 8 months ago
UbiData: Requirements and Architecture for Ubiquitous Data Access
Mobile users today demand ubiquitous access to their data from any mobile device and under variable connection quality. We refer to this requirement as any-time, any-where data ac...
Abdelsalam Helal, Joachim Hammer
BSN
2009
IEEE
158views Sensor Networks» more  BSN 2009»
14 years 2 months ago
Wearable Sensing for Dynamic Management of Dense Ubiquitous Media
— Most visions of ubiquitous computing anticipate a world permeated by a dense sampling of sensors, many of which will be capable of capturing, analyzing, and transmitting person...
Mathew Laibowitz, Nan-Wei Gong, Joseph A. Paradiso
SAC
2004
ACM
14 years 1 months ago
A Ubiquitous Computing environment for aircraft maintenance
Ubiquitous Computing bears a high potential in the area of aircraft maintenance. Extensive requirements regarding quality, safety, and documentation as well as high costs for havi...
Matthias Lampe, Martin Strassner, Elgar Fleisch
DBSEC
2000
112views Database» more  DBSEC 2000»
13 years 9 months ago
Coordinating Policy for Federated Applications
Abstract At the start of its present term of office in 1997 the UK government published a planning document promising ubiquitous access to Electronic Health Records (EHRs) held wit...
Ken Moody