Sciweavers

400 search results - page 22 / 80
» Enabling Personal Privacy for Pervasive Computing Environmen...
Sort
View
CCS
2009
ACM
14 years 9 months ago
Confidentiality-preserving distributed proofs of conjunctive queries
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
EUC
2008
Springer
13 years 10 months ago
A Probabilistic Approach to Consistency Checking for Pervasive Context
Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflictin...
Yu Huang 0002, Xiang Ma, XianPing Tao, Jiannong Ca...
SPC
2005
Springer
14 years 2 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
PERCOM
2007
ACM
14 years 8 months ago
Dynamic Context Bindings in Pervasive Middleware
Context-awareness (CA) enables the development of personalized pervasive services. Current context-aware infrastructures focus on middleware solutions to support acquisition, usag...
Tom Broens, Marten van Sinderen, Aart van Halteren...
TMC
2011
1105views more  TMC 2011»
13 years 3 months ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He