Sciweavers

1688 search results - page 8 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
105
Voted
CONTEXT
2003
Springer
15 years 4 months ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...
IWCMC
2010
ACM
15 years 1 months ago
Decentralized service composition in pervasive computing environments
In a pervasive computing environment, the devices are embedded in the physical world, providing services and interconnected by a communication network. Composition of these servic...
Joanna Izabela Siebert, Jiannong Cao, Long Cheng, ...
MOBILWARE
2009
ACM
15 years 6 months ago
A Quality of Context-Aware Approach to Access Control in Pervasive Environments
Alessandra Toninelli, Antonio Corradi, Rebecca Mon...
54
Voted
WICOMM
2008
61views more  WICOMM 2008»
14 years 11 months ago
Pervasive data access in wireless and mobile computing environments
Ken C. K. Lee, Wang-Chien Lee, Sanjay Kumar Madria
BIOWIRE
2007
Springer
15 years 5 months ago
Field-Based Coordination for Pervasive Computing Applications
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
Marco Mamei, Franco Zambonelli