Sciweavers

1010 search results - page 9 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
112
Voted
ISPAN
2009
IEEE
15 years 4 months ago
SoCQ: A Framework for Pervasive Environments
Abstract—Querying non-conventional data sources is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is...
Yann Gripay, Frédérique Laforest, Je...
68
Voted
CSREASAM
2008
14 years 11 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
IJNSEC
2006
156views more  IJNSEC 2006»
14 years 9 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
ICDCSW
2003
IEEE
15 years 2 months ago
Middleware and Application Adaptation Requirements and Their Support in Pervasive Computing
Pervasive computing environments are characterized by an additional heterogeneity compared to existing computing infrastructures. Devices ranging from small embedded systems to fu...
Christian Becker, Gregor Schiele