Sciweavers

1373 search results - page 41 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 8 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
ATC
2006
Springer
14 years 10 days ago
Development and Runtime Support for Situation-Aware Security in Autonomic Computing
Abstract. To overcome increasing complexity and dynamic nature of distributed computing system, such as ubiquitous computing systems, it is critical to have computing systems that ...
Stephen S. Yau, Yisheng Yao, Min Yan
SASO
2008
IEEE
14 years 3 months ago
A New Paradigm for SpeckNets: Inspiration from Fungal Colonies
In this position paper, we propose the development of a new biologically inspired paradigm based on fungal colonies, for the application to pervasive adaptive systems. Fungal colo...
Ruth Falconer, James Bown, Emma Hart, Jon Timmis
SUTC
2008
IEEE
14 years 3 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
MOBISYS
2007
ACM
14 years 8 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi