Sciweavers

400 search results - page 47 / 80
» Enabling Personal Privacy for Pervasive Computing Environmen...
Sort
View
CCS
2008
ACM
13 years 10 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
CCS
2008
ACM
13 years 10 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
KES
2008
Springer
13 years 8 months ago
The PERPLEXUS bio-inspired hardware platform: A flexible and modular approach
This paper introduces the Perplexus hardware platform, a scalable computing substrate made of custom reconfigurable devices endowed with bio-inspired capabilities. This platform w...
Andres Upegui, Yann Thoma, Eduardo Sanchez, Andr&e...
HCW
1998
IEEE
14 years 1 months ago
The Globus Project: A Status Report
The Globus project is a multi-institutional research e ort that seeks to enable the construction of computational grids providing pervasive, dependable, and consistent access to h...
Ian T. Foster, Carl Kesselman
E4MAS
2005
Springer
14 years 2 months ago
A Survey of Environments and Mechanisms for Human-Human Stigmergy
Stigmergy (the coordination of agents through signs they make and sense in a shared environment) was originally articulated in the study of social insects. Its basic processes are ...
H. Van Dyke Parunak