Sciweavers

3276 search results - page 50 / 656
» Data Management for Pervasive Computing
Sort
View
SACMAT
2009
ACM
15 years 10 months ago
Safety in discretionary access control for logic-based publish-subscribe systems
Publish-subscribe (pub-sub) systems are useful for many applications, including pervasive environments. In the latter context, however, great care must be taken to preserve the pr...
Kazuhiro Minami, Nikita Borisov, Carl A. Gunter
PERVASIVE
2007
Springer
15 years 10 months ago
Inference Attacks on Location Tracks
Although the privacy threats and countermeasures associated with location data are well known, there has not been a thorough experiment to assess the effectiveness of either. We ex...
John Krumm
CSREASAM
2008
15 years 5 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
EUC
2005
Springer
15 years 9 months ago
Ubiquitous Content Formulations for Real-Time Information Communications
Abstract. With rapid advancements in wireless devices, ubiquitous computing seems becoming a reality everyday. Active pervasive network infrastructure has been introduced to offer...
Ka Lun Eddie Law, Sunny So
EUC
2004
Springer
15 years 9 months ago
Context-Aware State Management for Ubiquitous Applications
In a ubiquitous computing environment, users continuously access computing services and interact with smart spaces, while moving from one place to another. Application migration, t...
Pauline P. L. Siu, Nalini Moti Belaramani, Cho-Li ...