This paper presents an approach for managing access to services over presence-based communications based on the context of the situation. This paper addresses two technical challe...
Context-aware applications can better meet users’ needs when sensing agents installed in the environment automatically provide input relevant to the application. However, this n...
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
The need for service providers to offer SLAs to gain consumers confidence has become increasingly apparent. Our work focuses on providers who manage the execution of long-running d...
Daniel Spaven, Madhavi Rani, Sumit Kumar Bose, Mik...
In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-...
Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Ba...