Sciweavers

266 search results - page 18 / 54
» Design of a Security Management Middleware in Ubiquitous Com...
Sort
View
MIDDLEWARE
2005
Springer
14 years 29 days ago
Functional and architectural adaptation in pervasive computing environments
Service-oriented computing paradigm encourages the use of dynamic binding of application requirements to the resources needed to fulfill application tasks. Especially in pervasive...
Nanjangud C. Narendra, Umesh Bellur, S. K. Nandy, ...
COLCOM
2007
IEEE
13 years 11 months ago
Transparent security for collaborative environments
Current collaborative tools are often not able to profit from existing systems for user management. It is therefore necessary for collaborative systems to administrate their users ...
Eva Hladká, Daniel Kouril, Michal Proch&aac...
CSREASAM
2007
13 years 9 months ago
Contextual Risk-Based Access Control
- Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are in...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
SAC
2004
ACM
14 years 27 days ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
PUC
2008
113views more  PUC 2008»
13 years 7 months ago
A resource and context model for mobile middleware
Abstract Mobile computing systems should be selfmanaged to simplify operation and maintenance plus meet user's expectation with respect to Quality of Service (QoS). When archi...
Sten Lundesgaard Amundsen, Frank Eliassen