We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
In this paper, we describe the use of description logic as the basis for a policy representation language and show how it is used in our implementation of a policy managed pervasi...
Tim Owen, Ian Wakeman, Bill Keller, Julie Weeds, D...
— Mobile Agents model is widely accepted as a good solution to simplify the coordination in a complex and distributed environment. Pervasive computing, presents many issues regar...
- Pervasive computing is an emerging technology that brings new dimensions to distributed computing; it uses a wide variety of smart, ubiquitous devices throughout an individual’...
David Levine, Renjith Thomas, Farhad Kamangar, Ger...
Abstract—Querying non-conventional data sources is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is...