Sciweavers

266 search results - page 10 / 54
» Design of a Security Management Middleware in Ubiquitous Com...
Sort
View
PERCOM
2008
ACM
14 years 7 months ago
SGR: A Shared Generic Routing Support for Ad Hoc Ubiquitous Computing Environments
One of the most evident characteristics of an ad hoc ubiquitous computing environment is the dynamism of connections. Due to the mobility of nodes, paths between communicating pee...
Yangwoo Ko, Dongman Lee
PERCOM
2007
ACM
14 years 7 months ago
Towards an Open Source Toolkit for Ubiquitous Device Authentication
Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless communication. Due ...
Rene Mayrhofer
ECUMN
2007
Springer
14 years 1 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
BIS
2008
120views Business» more  BIS 2008»
13 years 9 months ago
Enabling Context-Based Cooperation: A Generic Context Model and Management System
Abstract. In order to realise complex service-based applications on system platforms for context-aware ubiquitous computing environments, mobile processes have been introduced to s...
Christian P. Kunze, Sonja Zaplata, Mirwais Turjale...
COOPIS
2004
IEEE
13 years 11 months ago
Dynamic Access Control for Ubiquitous Environments
Current ubiquitous computing environments provide many kinds of information. This information may be accessed by different users under varying conditions depending on various conte...
Jehan Wickramasuriya, Nalini Venkatasubramanian