Sciweavers

274 search results - page 31 / 55
» Developing a Model for Trust Management in Pervasive Devices
Sort
View
PERVASIVE
2010
Springer
13 years 5 months ago
LOC8: A Location Model and Extensible Framework for Programming with Location
ing model abstracts over various types of positioning systems and incorporates the capture of uncertainty, serving as a foundation on which developers can apply sensor-fusion techn...
Graeme Stevenson, Juan Ye, Simon Dobson, Paddy Nix...
SIGMOD
2002
ACM
106views Database» more  SIGMOD 2002»
13 years 7 months ago
A Study on the Management of Semantic Transaction for Efficient Data Retrieval
Mobile computing technology is developing rapidly due to the advantages of information access through mobile devices and the need to retrieve information at remote locations. Howe...
Shi-Ming Huang, Irene S. Y. Kwan, Chih-He Li
CCS
2005
ACM
14 years 1 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
ICISC
2001
156views Cryptology» more  ICISC 2001»
13 years 9 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
JTAER
2007
123views more  JTAER 2007»
13 years 7 months ago
Business Model Scenarios for Remote Management
This article critically appraises business model challenges in implementing remote management functionalities. Remote management is believed to create new service opportunities an...
Olivier Braet, Pieter Ballon