Sciweavers

1988 search results - page 2 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
IASTEDSE
2004
13 years 7 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
OZCHI
2006
ACM
13 years 11 months ago
From the certainty of information transfer to the ambiguity of intuition
Handovers between shifts are known causes of preventable adverse events in hospitals. In order to gain an insight into the information transfer that occurs between shifts of senio...
Florian Mueller, Stefanie Kethers, Leila Alem, Ros...
FTDCS
1997
IEEE
13 years 10 months ago
Intrusion ripple analysis in distributed information systems
: Security is a very important aspect of distributed computing systems, especially in distributed information environments involving widearea networks, such as internets. In this p...
S. S. Yau, Jun Zhu
ADHOCNETS
2009
Springer
13 years 8 months ago
Efficient Distribution of Large Files in UMTS Supported by Network Coded M2M Data Transfer with Multiple Generations
This paper is a sequel of previous work, in which we have studied the traffic management problem in UMTS. The main objective was to improve the spectral efficiency of cellular netw...
Larissa Popova, Wolfgang H. Gerstacker, Wolfgang K...
FASE
2003
Springer
13 years 11 months ago
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...
David Scott, Alastair R. Beresford, Alan Mycroft