Monitoring host behavior in a network is one of the most essential tasks in the fields of network monitoring and security since more and more malicious code in the wild internet c...
Abstract. This paper proposes an extended framework for service provision for ubiquitous spaces based on Kerberos. The framework allows groups of services and information about ord...
—Data security is one of the major challenges that prevents the wider acceptance of mobile devices, especially within business and government environments. It is non-trivial to p...
Tracking technologies use pervasive information systems to scan and record the location of individuals and to transfer information about them to and from a central database. One p...
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...