Sciweavers

22 search results - page 2 / 5
» Activity-oriented access control to ubiquitous hospital info...
Sort
View
PERCOM
2003
ACM
14 years 5 months ago
Cerberus: A Context-Aware Security Scheme for Smart Spaces
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physi...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
IEEEARES
2007
IEEE
13 years 12 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
PUC
2006
158views more  PUC 2006»
13 years 5 months ago
Can we do without GUIs? Gesture and speech interaction with a patient information system
We have developed a gesture input system that provides a common interaction technique across mobile, wearable and ubiquitous computing devices of diverse form factors. In this pap...
Eamonn O'Neill, Manasawee Kaenampornpan, Vassilis ...
TIFS
2010
130views more  TIFS 2010»
13 years 11 days ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
PUC
2000
97views more  PUC 2000»
13 years 5 months ago
Look, Ma, My Homepage is Mobile!
Much of the ongoing research in ubiquitous computing has concentrated on providing context information, e.g. location information, to the level of services and applications. Typic...
Roger Kehr, Andreas Zeidler