Sciweavers

295 search results - page 28 / 59
» An Approach to Trust Management Challenges for Critical Infr...
Sort
View
FGCS
2008
159views more  FGCS 2008»
15 years 15 days ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
109
Voted
AAI
2006
126views more  AAI 2006»
15 years 16 days ago
Theory and practice of field-based motion coordination in multiagent systems
Enabling and managing coordination activities between autonomous, possibly mobile, computing entities in dynamic computing scenarios challenges traditional approaches to distribut...
Marco Mamei, Franco Zambonelli
120
Voted
EKAW
2010
Springer
14 years 11 months ago
Using Semantic Web Resources for Data Quality Management
The quality of data is a critical factor for all kinds of decision-making and transaction processing. While there has been a lot of research on data quality in the past two decades...
Christian Fürber, Martin Hepp
CCS
2009
ACM
15 years 7 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
119
Voted
WISTP
2007
Springer
15 years 6 months ago
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
Abstract. For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to ...
Walter Bamberger, Oliver Welter, Stephan Spitz