Sciweavers

6861 search results - page 73 / 1373
» Security for Ubiquitous Computing
Sort
View
TEI
2010
ACM
135views Hardware» more  TEI 2010»
14 years 5 months ago
Hands and fingers: a mobile platform for a person-centric network of computational objects
We describe a practical vision of ubiquitous computing with tangible interfaces, that orbits around an individual and is mediated by his or her personal consumer electronic device...
John Kestner, Henry Holtzman
ENTCS
2007
112views more  ENTCS 2007»
13 years 10 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
EUC
2005
Springer
14 years 3 months ago
The Performance Estimation of the Situation Awareness RFID System from Ubiquitous Environment Scenario
Many sensors providing situation data will be in everywhere under the ubiquitous environment. It requires the current RFID system should be extended to recognize and use situation ...
Dongwon Jeong, Heeseo Chae, Hoh Peter In
WPES
2004
ACM
14 years 3 months ago
Specifying privacy policies with P3P and EPAL: lessons learned
As computing becomes more ubiquitous and Internet use continues to rise, it is increasingly important for organizations to construct accurate and effective privacy policies that d...
William H. Stufflebeam, Annie I. Antón, Qin...
ESAS
2007
Springer
14 years 2 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer