Sciweavers

1010 search results - page 45 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
ESORICS
2004
Springer
15 years 5 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
ICPP
2007
IEEE
15 years 6 months ago
FlexFetch: A History-Aware Scheme for I/O Energy Saving in Mobile Computing
Extension of battery lifetime has always been a major issue for mobile computing. While more and more data are involved in mobile computing, energy consumption caused by I/O opera...
Feng Chen, Song Jiang, Weisong Shi, Weikuan Yu
APNOMS
2006
Springer
15 years 3 months ago
On the Security of Attribute Certificate Structuring for Highly Distributed Computing Environments
For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
Soomi Yang
SOUPS
2009
ACM
15 years 6 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
AINA
2007
IEEE
15 years 6 months ago
Pervasive Service Composition in the Home Network
The home environment becomes ready to host distributed devices dynamically adapting to service availability and reacting to user location and user activity. Sensors, high definiti...
André Bottaro, Anne Gérodolle, Phili...