Sciweavers

203 search results - page 5 / 41
» Enabling Context-Aware and Privacy-Conscious User Data Shari...
Sort
View
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 23 days ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
DBSEC
2011
233views Database» more  DBSEC 2011»
12 years 9 months ago
Multiparty Authorization Framework for Data Sharing in Online Social Networks
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractiv...
Hongxin Hu, Gail-Joon Ahn
IFIP
2009
Springer
13 years 3 months ago
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
Liqun Chen, Mark Ryan
SEMWEB
2010
Springer
13 years 3 months ago
Semantic Techniques for Enabling Knowledge Reuse in Conceptual Modelling
Abstract. Conceptual modelling tools allow users to construct formal representations of their conceptualisations. These models are typically developed in isolation, unrelated to ot...
Jorge Gracia del Río, Jochem Liem, Esther L...
EEMMAS
2007
Springer
13 years 12 months ago
Engineering Contextual Information for Pervasive Multiagent Systems
Multiagent systems for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises th...
Gabriella Castelli, Marco Mamei, Franco Zambonelli