Sciweavers

6861 search results - page 67 / 1373
» Security for Ubiquitous Computing
Sort
View
CRITIS
2006
14 years 2 months ago
Enforcing Trust in Pervasive Computing with Trusted Computing Technology
Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
HUC
2005
Springer
14 years 3 months ago
A New Method for Auto-calibrated Object Tracking
Ubiquitous computing technologies which are cheap and easy to use are more likely to be adopted by users beyond the ubiquitous computing community. We present an ultrasonic-only tr...
Paul Duff, Michael R. McCarthy, Angus Clark, Henk ...
IEEEARES
2010
IEEE
14 years 5 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
MOBILITY
2009
ACM
14 years 3 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
CORR
2011
Springer
195views Education» more  CORR 2011»
13 years 5 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...