Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
This paper explores end-user sensor installation for domestic ubiquitous computing applications and proposes five design principles to support this task. End-user sensor installati...
In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-...
Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Ba...
— In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. While this ubiquitous computing...
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...