In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
A challenge for pervasive computing is the seamless integration of computer support with users’ activities in a very dynamic setting, with deep human and resource mobility. Port...
Amal El Fallah-Seghrouchni, Karin Breitman, Nicola...
Pervasive applications rely on data captured from the physical world through sensor devices. Data provided by these devices, however, tend to be unreliable. The data must, therefor...
Shawn R. Jeffery, Gustavo Alonso, Michael J. Frank...
Querying non-conventional data is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is the ability to qu...