Sciweavers

145 search results - page 9 / 29
» Privacy enhanced access control in pervasive computing envir...
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
GI
2009
Springer
13 years 5 months ago
Visual Twittering Using Mobile Phones in Pervasive Environments
Abstract: Research in the field of academic teaching and life focuses on the integration of recent technologies. Additionally, new trends within the current usage of e.g. the Inter...
Michael Wittke, Sven Tomforde, Yaser Chaaban, J&uu...
PERCOM
2005
ACM
14 years 7 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
TLT
2008
92views more  TLT 2008»
13 years 6 months ago
Lifelong Learner Modeling for Lifelong Personalized Pervasive Learning
Pervasive and ubiquitous computing has the potential to make huge changes in the ways that we will learn throughout our lives. This paper presents a vision for the lifelong user mo...
Judy Kay
JNW
2006
94views more  JNW 2006»
13 years 7 months ago
An Efficient Role Specification Management Model for Highly Distributed Environments
Abstract--Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For ...
Soomi Yang