Sciweavers

46 search results - page 5 / 10
» m-LPN: An Approach Towards a Dependable Trust Model for Perv...
Sort
View
EICS
2009
ACM
14 years 2 months ago
Toward user interface virtualization: legacy applications and innovative interaction systems
Single-user, desktop-based computer applications are pervasive in our daily lives and work. The prospect of using these applications with innovative interaction systems, like mult...
Guillaume Besacier, Frédéric Vernier
TRUST
2009
Springer
14 years 2 months ago
Remote Attestation of Attribute Updates and Information Flows in a UCON System
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...
PERVASIVE
2011
Springer
12 years 10 months ago
n-Gram Geo-trace Modeling
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...
SUTC
2010
IEEE
13 years 11 months ago
Towards the Development of an Ubiquitous Networked Robot Systems for Ambient Assisted Living
—Robotic middlewares increasingly allow the seamless integration of multiple heterogeneous robots into one distributed system. With the inclusion of ambient intelligence and perv...
Jayedur Rashid
SACMAT
2011
ACM
12 years 10 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali