Sciweavers

1010 search results - page 2 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
BROADNETS
2005
IEEE
13 years 10 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
ISEM
2006
112views more  ISEM 2006»
13 years 4 months ago
Ubiquitous computing: connecting Pervasive computing through Semantic Web
Ubiquitous computing refers to building a global computing environment where seamless and invisible access to computing resources is provided to the user. Pervasive computing deal...
Sachin Singh, Sushil Puradkar, Yugyung Lee
AINA
2007
IEEE
13 years 11 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang
IASTEDSE
2004
13 years 6 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
PERCOM
2007
ACM
14 years 4 months ago
Distributed, Uncertainty-Aware Access Control for Pervasive Computing
Access control to sensitive resources in pervasive computing needs to take uncertainty into account. Previous research has developed uncertainty-aware access-control models for en...
Urs Hengartner, Ge Zhong