The big challenge related to the contemporary research on ubiquitous and pervasive computing is that of seamless integration. For the next generation of ubiquitous and distributed...
Distributed simulation applications often rely on middleware to provide services to support their execution over distributed computing environments. Such middleware spans many lev...
Thom McLean, Richard M. Fujimoto, J. Brad Fitzgibb...
Context aware middleware infrastructures have traditionally been implemented with a modular approach to allow different components to work cooperatively and supply context synthes...
Saad Liaquat Kiani, Maria Riaz, Yonil Zhung, Sungy...
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...