Sciweavers

94 search results - page 6 / 19
» Models, Protocols, and Architectures for Secure Pervasive Co...
Sort
View
SUTC
2008
IEEE
14 years 2 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
PERCOM
2008
ACM
13 years 7 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
ICDCSW
2007
IEEE
13 years 7 months ago
A Middleware Support for Agent-Based Application Mobility in Pervasive Environments
—Application mobility is an efficient way to mask uneven conditioning and reduce users’ distractions in pervasive environments. However, since mobility brings more dynamism and...
Yu Zhou, Jiannong Cao, Vaskar Raychoudhury, Joanna...
CSREASAM
2009
13 years 8 months ago
Security Level Determination Using Branes for Contextual Based Global Processing: An Architecture
This paper presents the basics of a new paradigm that allows generators and consumers of global contextual information to determine an appropriate security level needed for contex...
Greg Vert, Evangelos Triantaphyllou
WWW
2011
ACM
13 years 2 months ago
Towards liquid service oriented architectures
The advent of Cloud computing platforms, and the growing pervasiveness of Multicore processor architectures have revealed the inadequateness of traditional programming models base...
Daniele Bonetta, Cesare Pautasso