Sciweavers

315 search results - page 49 / 63
» Supporting location-based conditions in access control polic...
Sort
View
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
14 years 1 months ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
NBIS
2007
Springer
14 years 2 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
ADHOC
2007
131views more  ADHOC 2007»
13 years 8 months ago
Perceptive admission control for wireless network quality of service
As wireless networks become more widely used, there is a growing need to support advanced services, such as multimedia streaming and voice over IP. Traditional approaches to guara...
Ian D. Chakeres, Elizabeth M. Belding-Royer, Josep...
CCS
2004
ACM
14 years 1 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
HICSS
2006
IEEE
134views Biometrics» more  HICSS 2006»
14 years 2 months ago
Differentiated Priority Scheduling and Adaptive Segmentation for Bluetooth Piconets
Bluetooth is a wireless communication technology, aimed at supporting connectivity among close proximity mobile devices. Bluetooth enables the design of low-power, low-cost, and s...
Jyothsna Kalvala, Gergely V. Záruba