Sciweavers

114 search results - page 2 / 23
» A Flexible and Scalable Access Control for Ubiquitous Comput...
Sort
View
ECUMN
2007
Springer
13 years 11 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 6 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
FGCS
2008
159views more  FGCS 2008»
13 years 5 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
PDCAT
2007
Springer
13 years 11 months ago
A Service Discovery Framework for Ubiquitous Computing
This paper presents a novel service discovery framework for ubiquitous computing called Ubiquitous Computing Service Discovery Framework (UCSDF). UCSDF offers a more flexible and ...
Xiaoguang Gu, Hongzhou Shi, Jian Ye, Zhenmin Zhu
MOBIQUITOUS
2007
IEEE
13 years 11 months ago
Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering
Abstract— Large-scale ubiquitous computing environments require scalable and robust service discovery to enable “anytime, anywhere” computing, which is hard to be satisfied ...
Wei Gao