Sciweavers

772 search results - page 3 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
NBIS
2007
Springer
13 years 12 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
WOWMOM
2005
ACM
99views Multimedia» more  WOWMOM 2005»
13 years 11 months ago
Small Worlds and the Security of Ubiquitous Computing
This paper considers the small-world phenomenon in two contexts: ubiquitous computing and security. We argue that small-world properties emerge in ubicomp systems due to their nat...
Harald Vogt
PERCOM
2011
ACM
12 years 8 months ago
Ubiquitous cloud: Managing service resources for adaptive ubiquitous computing
Abstract—The adaptive ubiquitous services, which dynamically adapt behaviors to requirements and contexts, are one of the major challenges in the ubiquitous computing. To facilit...
Koichi Egami, Shinsuke Matsumoto, Masahide Nakamur...
MOBIQUITOUS
2005
IEEE
13 years 11 months ago
A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing
A significant deterrent to the ability to connect in a spontaneous manner in cross-enterprise collaborative applications is the difficulty in users from different domains being ab...
Ramiro Liscano, Kaining Wang
ACISICIS
2005
IEEE
13 years 11 months ago
A Comprehensive Middleware Architecture for Context-Aware Ubiquitous Computing Systems
Ubiquitous computing is viewed as a computing paradigm where minimal user intervention is necessitated emphasizing detection of environmental conditions and user behaviors in orde...
Anjum Shehzad, Hung Quoc Ngo, Sungyoung Lee, Young...