Sciweavers

91 search results - page 11 / 19
» Architecting Pervasive Computing Systems for Privacy: A Surv...
Sort
View
FOSAD
2009
Springer
15 years 4 months ago
Logic in Access Control (Tutorial Notes)
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and t...
Martín Abadi
74
Voted
ITNG
2007
IEEE
15 years 3 months ago
Human Computer Interaction Based Intrusion Detection
—In this paper we survey the state of the art in direct and indirect human computer interaction based biometrics. Direct HCI biometrics are based on abilities, style, preference,...
Roman V. Yampolskiy
PERCOM
2003
ACM
15 years 9 months ago
Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services
In pervasive computing environments, powerful handheld devices with wireless connections create opportunities for many new nomadic applications. We propose a new service discovery...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
ICSE
2007
IEEE-ACM
15 years 9 months ago
A Perspective on the Future of Middleware-based Software Engineering
Middleware is a software layer that stands between the networked operating system and the application and provides well known reusable solutions to frequently encountered problems...
Mauro Caporuscio, Nikolaos Georgantas, Valé...
ATAL
2004
Springer
15 years 2 months ago
Intelligent Agents Meet Semantic Web in a Smart Meeting Room
We describe a new smart meeting room system called EasyMeeting that explores the use of FIPA agent technologies, Semantic Web ontologies, logic reasoning, and security and privacy...
Harry Chen, Filip Perich, Dipanjan Chakraborty, Ti...