Sciweavers

318 search results - page 17 / 64
» Enforcing Trust in Pervasive Computing with Trusted Computin...
Sort
View
WPES
2003
ACM
14 years 24 days ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
BIOWIRE
2007
Springer
14 years 1 months ago
Field-Based Coordination for Pervasive Computing Applications
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
Marco Mamei, Franco Zambonelli
MOBIHOC
2012
ACM
11 years 10 months ago
Enforcing dynamic spectrum access with spectrum permits
Dynamic spectrum access is a maturing technology that allows next generation wireless devices to make highly efficient use of wireless spectrum. Spectrum can be allocated on an o...
Lei Yang, Zengbin Zhang, Ben Y. Zhao, Christopher ...
CSCW
2011
ACM
13 years 2 months ago
Creating a context of trust with ICTs: restoring a sense of normalcy in the environment
This paper reports on an ethnographic study of the technology-enabled behavior that took place amongst a citizen population living in a conflict zone. We interviewed 65 Iraqi citi...
Bryan Semaan, Gloria Mark
JCM
2008
73views more  JCM 2008»
13 years 7 months ago
Secure and Distributed P2P Reputation Management
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way...
Jianli Hu, Quanyuan Wu, Bin Zhou