Sciweavers

145 search results - page 2 / 29
» Privacy enhanced access control in pervasive computing envir...
Sort
View
PERVASIVE
2007
Springer
13 years 10 months ago
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users’ cont...
Apu Kapadia, Tristan Henderson, Jeffrey J. Fieldin...
CSREAPSC
2006
13 years 6 months ago
An Access Control Framework for Pervasive Computing Environments
Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Sarah Javanmardi, Hadi Hemmati, Rasool Jalili
WICSA
2007
13 years 5 months ago
Architecting Pervasive Computing Systems for Privacy: A Survey
In pervasive computing systems, a higher number of interactions will be mediated by computers, amplifying the menace to privacy. Privacy protection in pervasive environments is st...
Roberto Speicys Cardoso, Valérie Issarny
PERCOM
2006
ACM
14 years 4 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
COMPSAC
2006
IEEE
13 years 10 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver