Sciweavers

91 search results - page 2 / 19
» Architecting Pervasive Computing Systems for Privacy: A Surv...
Sort
View
NBIS
2009
Springer
14 years 2 days ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
CSREAPSC
2006
13 years 7 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
COOPIS
2003
IEEE
13 years 10 months ago
Jini Supporting Ubiquitous and Pervasive Computing
The overall purpose of this article is partly to give a brief overview of the TangO conceptual model, partly to explore the Jini technology as a means for support of pervasive syst...
Kasper Hallenborg, Bent Bruun Kristensen
CNSR
2007
IEEE
124views Communications» more  CNSR 2007»
13 years 12 months ago
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes’ locations with high...
Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. ...
ICONS
2008
IEEE
13 years 12 months ago
Using User Preferences to Enhance Privacy in Pervasive Systems
With the increasing interest in developing pervasive computing technologies there is growing recognition of the problems of maintaining user privacy. In the Daidalos pervasive sys...
Elizabeth Papadopoulou, Sarah McBurney, Nick K. Ta...