Sciweavers

46 search results - page 1 / 10
» m-LPN: An Approach Towards a Dependable Trust Model for Perv...
Sort
View
ICPPW
2006
IEEE
13 years 10 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 5 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
ARCS
2004
Springer
13 years 10 months ago
Extending the MVC Design Pattern towards a Task-Oriented Development Approach for Pervasive Computing Applications
Abstract. This paper addresses the implementation of pervasive Java Web applications using a development approach that is based on the Model-ViewController (MVC) design pattern. We...
Patrick Sauter, Gabriel Vögler, Günther ...
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 8 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
HCI
2009
13 years 2 months ago
Trust in Online Technology: Towards Practical Guidelines Based on Experimentally Verified Theory
Abstract. A large amount of research attempts to define trust, yet relatively little research attempts to experimentally verify what makes trust needed in interactions with humans ...
Christian Detweiler, Joost Broekens