Sciweavers

886 search results - page 14 / 178
» Is It Only About Internet Access
Sort
View
SIS
2008
13 years 10 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
NDSS
2006
IEEE
14 years 2 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
OTM
2007
Springer
14 years 2 months ago
Issues in Location-Based Indexing for Co-operating Mobile Information Systems
Mobile information systems need to collaborate with each other to provide seamless information access to the user. Information about the user and their context provides the points ...
Wendy Osborn, Annika Hinze
ICWN
2004
13 years 10 months ago
Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways
- Mobile ad hoc networks allow mobile nodes to communicate with one another without the aid of infrastructure thus forming temporary networks on the fly. While such networks are ga...
Shiv Mehra, Chansu Yu
ASSETS
2008
ACM
13 years 10 months ago
A comparative test of web accessibility evaluation methods
Accessibility auditors have to choose a method when evaluating accessibility: expert review (a.k.a. conformance testing), user testing, subjective evaluations, barrier walkthrough...
Giorgio Brajnik