Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
In Ubiquitous computing environment the mobile devices such as PDAs necessarily connect to remote storage servers. We present an iSCSI caching system that localizes iSCSI target to...
Today, commodity technologies like mobile phones—once symbols of status and wealth—have become deeply woven into social and economic participation in Western society. Despite ...
Christopher A. Le Dantec, Robert G. Farrell, Jim C...
In this paper, we analyze the role of the social group in a Ubiquitous Computing (Ubicomp) environment as a source of contextual information. A model is presented to address the s...
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...