Sciweavers

6861 search results - page 11 / 1373
» Security for Ubiquitous Computing
Sort
View
ICCS
2007
Springer
14 years 1 months ago
A Privacy-Aware Identity Design for Exploring Ubiquitous Collaborative Wisdom
Privacy and security has been considered as the top criterion for the acceptance of e-service adoption. In this paper, we proposed a privacy aware identity protection design that i...
Yuanchu Hwang, Soe-Tsyr Yuan
ICUMT
2009
13 years 5 months ago
Visualizations of human activities in sensor-enabled ubiquitous environments
Abstract--Sensor network ubiquitous environments may generate a lot of data including heterogeneous `raw' sensor data, low-level feature and/or trend data and higher-level con...
Brian J. d'Auriol, Le Xuan Hung, Sungyoung Lee, Yo...
PUC
2002
84views more  PUC 2002»
13 years 7 months ago
Designing Ubiquitous Computing Games - A Report from a Workshop Exploring Ubiquitous Computing Entertainment
: We report from a Research Atelier that explored how ubiquitous computing could be applied to fun and entertainment. The Atelier lasted for five days, starting with two days of sc...
Staffan Björk, Jussi Holopainen, Peter Ljungs...
ISM
2005
IEEE
109views Multimedia» more  ISM 2005»
14 years 1 months ago
A Trust Model for Ubiquitous Systems based on Vectors of Trust Values
Ubiquitous Computing foresees a massively networked world supporting a population of diverse but cooperating mobile devices where trust relationships between entities are uncertai...
Hassan Jameel, Hung Le Xuan, Umar Kalim, Ali Sajja...
UCS
2004
Springer
14 years 25 days ago
Realizing a Secure Federation of Multi-institutional Service Systems
Abstract. This paper proposes an extended framework for service provision for ubiquitous spaces based on Kerberos. The framework allows groups of services and information about ord...
Yu Enokibori, Nobuhiko Nishio