Sciweavers

94 search results - page 1 / 19
» Models, Protocols, and Architectures for Secure Pervasive Co...
Sort
View
PERCOM
2004
ACM
14 years 4 months ago
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions
We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Roshan K. Thomas, Ravi S. Sandhu
GCC
2003
Springer
13 years 9 months ago
Research on Security Architecture and Protocols of Grid Computing System
This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstra...
Xiangming Fang, Shoubao Yang, Leitao Guo, Lei Zhan...
COMPUTER
2008
90views more  COMPUTER 2008»
13 years 4 months ago
Challenges and Lessons in Developing Middleware on Smart Phones
Near-ubiquitous smart phones are the most promising heralds of future pervasive computing. However, despite their increasing capabilities in computation, communication, and sensin...
Oriana Riva, Jaakko Kangasharju
COMPSAC
2009
IEEE
13 years 11 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
PERCOM
2005
ACM
14 years 4 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis