Sciweavers

5511 search results - page 93 / 1103
» Security for Network Places
Sort
View
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 10 months ago
INDECT Advanced Security Requirements
This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features...
Manuel Urueña, Petr Machnik, Maria Martinez...
ETFA
2005
IEEE
14 years 4 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
KI
2007
Springer
14 years 4 months ago
Location-Based Activity Recognition
Learning patterns of human behavior from sensor data is extremely important for high-level activity inference. We show how to extract and label a person’s activities and signiď¬...
Dieter Fox
LOCA
2007
Springer
14 years 4 months ago
The Whereabouts Diary
The user profile is one of the main context-information in a wide range of pervasive computing applications. Modern handheld devices provided with localization capabilities could a...
Gabriella Castelli, Marco Mamei, Alberto Rosi
PERCOM
2004
ACM
14 years 10 months ago
Towards Context-aware Security: An Authorization Architecture for Intranet Environments
This paper introduces a context-aware authorization architecture that is designed to augment existing network security protocols in an Intranet environment. It describes the archi...
Chris Wullems, Mark Looi, Andrew Clark