Sciweavers

93 search results - page 8 / 19
» Trust Management Model and Architecture for Context-Aware Se...
Sort
View
CCS
2008
ACM
13 years 10 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
TMC
2008
159views more  TMC 2008»
13 years 6 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
IEEESCC
2009
IEEE
13 years 5 months ago
Reconfigurable SCA Applications with the FraSCAti Platform
The Service Component Architecture (SCA) is a technology agnostic standard for developing and deploying distributed service-oriented applications. However, SCA does not define sta...
Lionel Seinturier, Philippe Merle, Damien Fournier...
IWAN
2000
Springer
13 years 11 months ago
A Flexible IP Active Networks Architecture
This paper presents the main concepts of the IST Project FAIN "Future Active IP Networks" [10], a three-year collaborative research project, whose main task is to develo...
Alex Galis, Bernhard Plattner, Jonathan M. Smith, ...
COMSWARE
2008
IEEE
13 years 9 months ago
Collaborative group membership and access control for JXTA
Abstract-- This paper presents a proposal for group membership and access control services for JXTA, both based on the principle of self-organization and collaboration of peer grou...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...