Sciweavers

202 search results - page 12 / 41
» Managing Pervasive Environment Privacy Using the
Sort
View
BIOWIRE
2007
Springer
14 years 1 months ago
Bio-Inspired Approaches for Autonomic Pervasive Computing Systems
In this chapter, we present some of the biologically-inspired approaches, developed within the context of the European project BIONETS for enabling autonomic pervasive computing en...
Daniele Miorandi, Iacopo Carreras, Eitan Altman, L...
CCS
2008
ACM
13 years 9 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
SPC
2005
Springer
14 years 1 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
JNW
2006
94views more  JNW 2006»
13 years 7 months ago
An Efficient Role Specification Management Model for Highly Distributed Environments
Abstract--Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For ...
Soomi Yang
LOCA
2005
Springer
14 years 1 months ago
Context Obfuscation for Privacy via Ontological Descriptions
Context information is used by pervasive networking and context-aware programs to adapt intelligently to different environments and user tasks. As the context information is poten...
Ryan Wishart, Karen Henricksen, Jadwiga Indulska