Sciweavers

1373 search results - page 42 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
MIDDLEWARE
2004
Springer
14 years 1 months ago
GridBox: securing hosts from malicious and greedy applications
Security is an important concern in providing the infrastructure for the implementation of general purpose computational grids. However, most grid implementations focus their secu...
Evgueni Dodonov, Joelle Quaini Sousa, Hélio...
CCS
2011
ACM
12 years 8 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King
PERVASIVE
2006
Springer
13 years 8 months ago
iCAP: Interactive Prototyping of Context-Aware Applications
Although numerous context-aware applications have been developed and there have been technological advances for acquiring contextual information, it is still difficult to develop a...
Anind K. Dey, Timothy Sohn, Sara Streng, Justin Ko...
SOUPS
2009
ACM
14 years 3 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
PERVASIVE
2004
Springer
14 years 1 months ago
Context Cube: Flexible and Effective Manipulation of Sensed Context Data
In an effort to support the development of context-aware applications that use archived sensor data, we introduce the concept of the Context Cube based on techniques of data wareho...
Lonnie D. Harvel, Ling Liu, Gregory D. Abowd, Yu-X...