We promote an engineering approach to design of provably secure key exchange protocols. Using the model of Canetti and Krawczyk we present a systematic method to arrive at efficie...
Yiu Shing Terry Tin, Colin Boyd, Juanma Gonz&aacut...
This paper describes the development of a ubiquitous computing environment called the iRoom. Built from a foundation of the MIT Metaglue multi-agent software, a base level of func...
Jason B. Scholz, Mark W. Grigg, Paul Prekop, Mark ...
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Given the increasing use of webbase...
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Contextual information such as spatial location can significantly enhance the utility of mobile applications. We introduce the concept of active preferences that represent a comb...