Sciweavers

78 search results - page 3 / 16
» Controlled Availability of Pervasive Web Services
Sort
View
HOTOS
2003
IEEE
14 years 8 days ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste
SAINT
2005
IEEE
14 years 17 days ago
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture ...
Antonio Corradi, Rebecca Montanari, Daniela Tibald...
IJSWIS
2008
100views more  IJSWIS 2008»
13 years 7 months ago
Semantic-Based Bluetooth-RFID Interaction for Advanced Resource Discovery in Pervasive Contexts
We propose a novel object discovery framework integrating the application layer of Bluetooth and RFID standards. The approach is motivated and illustrated in an innovative u-comme...
Tommaso Di Noia, Eugenio Di Sciascio, Francesco M....
PERCOM
2006
ACM
14 years 6 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
ISSA
2004
13 years 8 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee