Sciweavers

202 search results - page 4 / 41
» Managing Pervasive Environment Privacy Using the
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
POLICY
2005
Springer
14 years 1 months ago
Managing the Policies of Non-Technical Users in a Dynamic World
In this paper, we describe the use of description logic as the basis for a policy representation language and show how it is used in our implementation of a policy managed pervasi...
Tim Owen, Ian Wakeman, Bill Keller, Julie Weeds, D...
WOA
2003
13 years 9 months ago
Using a Properties Based Naming System in Mobile Agents Environments for Pervasive Computing
— Mobile Agents model is widely accepted as a good solution to simplify the coordination in a complex and distributed environment. Pervasive computing, presents many issues regar...
Fabio Tarantino, Alessio Ravani, Mario Zambrini
PDPTA
2003
13 years 9 months ago
Mobile Agents for Pervasive Computing Using a Novel Method of Message Passing
- Pervasive computing is an emerging technology that brings new dimensions to distributed computing; it uses a wide variety of smart, ubiquitous devices throughout an individual’...
David Levine, Renjith Thomas, Farhad Kamangar, Ger...
ISPAN
2009
IEEE
14 years 2 months ago
SoCQ: A Framework for Pervasive Environments
Abstract—Querying non-conventional data sources is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is...
Yann Gripay, Frédérique Laforest, Je...