Sciweavers

266 search results - page 30 / 54
» Design of a Security Management Middleware in Ubiquitous Com...
Sort
View
MOBISYS
2007
ACM
14 years 8 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
OZCHI
2006
ACM
14 years 2 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
CCS
2007
ACM
14 years 2 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
MOBISYS
2007
ACM
14 years 8 months ago
Health-OS: : a position paper
The area of medical monitoring and diagnostics is of particular importance and relevance today. Modern nanotechnology has reduced prices and size of increasingly sophisticated sen...
Darko Kirovski, Nuria Oliver, Mike Sinclair, Desne...
PUC
2010
139views more  PUC 2010»
13 years 7 months ago
Digital plumbing: the mundane work of deploying UbiComp in the home
Deploying UbiComp in real homes is central to realizing Weiserʼs grand vision of ʻinvisibleʼ computing. It is essential to moving design out of the lab and making it into an unr...
Peter Tolmie, Andy Crabtree, Stefan Rennick Eggles...