Sciweavers

304 search results - page 23 / 61
» Trusted Computing in Mobile Action
Sort
View
MHCI
2005
Springer
14 years 1 months ago
ContextContacts: re-designing SmartPhone's contact book to support mobile awareness and collaboration
Acontextuality of the mobile phone often leads to a caller’s uncertainty over a callee’s current state, which in turn often hampers mobile collaboration. We are interested in ...
Antti Oulasvirta, Mika Raento, Sauli Tiitta
POLICY
2007
Springer
14 years 1 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
MAS
1998
Springer
172views Communications» more  MAS 1998»
13 years 12 months ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin
BIRTHDAY
2008
Springer
13 years 9 months ago
Secure Data Flow in a Calculus for Context Awareness
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computin...
Doina Bucur, Mogens Nielsen
CHI
2011
ACM
12 years 11 months ago
Publics in practice: ubiquitous computing at a shelter for homeless mothers
Today, commodity technologies like mobile phones—once symbols of status and wealth—have become deeply woven into social and economic participation in Western society. Despite ...
Christopher A. Le Dantec, Robert G. Farrell, Jim C...