Sciweavers

575 search results - page 2 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
PERCOM
2009
ACM
14 years 5 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...
PERCOM
2006
ACM
14 years 4 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
SIGDOC
2005
ACM
13 years 11 months ago
Animating pervasive computing
It is difficult to present new, complex ideas in ways that are informative and interesting in situations where a vast amount of information has to be delivered and understood quic...
Andrée Woodcock, John R. Burns, Sarah Mount...
ECIS
2003
13 years 6 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica
ITRUST
2005
Springer
13 years 10 months ago
Towards an Evaluation Methodology for Computational Trust Systems
Ciarán Bryce, Nathan Dimmock, Karl Krukow, ...