Sciweavers

1597 search results - page 105 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
FGCN
2008
IEEE
199views Communications» more  FGCN 2008»
14 years 4 months ago
A Context-Sensitive Rule-Based Architecture for a Smart Building Environment
In a smart building environment nomadic users can benefit from specialised contextsensitive services. These can increase productivity and offer an improved lifestyle for users. Th...
John Herbert, John O'Donoghue, Xiang Chen
IEEEARES
2007
IEEE
14 years 4 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...
CHIMIT
2007
ACM
14 years 2 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
SRDS
2008
IEEE
14 years 4 months ago
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a v...
Roberto Di Pietro, Di Ma, Claudio Soriente, Gene T...
MBEES
2010
13 years 12 months ago
Towards Architectural Programming of Embedded Systems
: Integrating architectural elements with a modern programming language is essential to ensure a smooth combination of architectural design and programming. In this position statem...
Arne Haber, Jan Oliver Ringert, Bernhard Rumpe