Sciweavers

274 search results - page 5 / 55
» Developing a Model for Trust Management in Pervasive Devices
Sort
View
CSREASAM
2008
14 years 11 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
FGCS
2008
159views more  FGCS 2008»
14 years 9 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
WIMOB
2008
IEEE
15 years 4 months ago
A Protocol for Pervasive Distributed Computing Reliability
Abstract—The adoption of new hardware and software architectures will make future generations of pervasive devices more flexible and extensible. Networks of computational nodes ...
Alberto Ferrante, Roberto Pompei, Anastasia Stulov...
ICDM
2009
IEEE
111views Data Mining» more  ICDM 2009»
14 years 7 months ago
To Trust or Not to Trust? Predicting Online Trusts Using Trust Antecedent Framework
This paper analyzes the trustor and trustee factors that lead to inter-personal trust using a well studied Trust Antecedent framework in management science [10]. To apply these fac...
Viet-An Nguyen, Ee-Peng Lim, Jing Jiang, Aixin Sun
LOCA
2005
Springer
15 years 3 months ago
Context Modelling and Management in Ambient-Aware Pervasive Environments
Services in pervasive computing systems must evolve so that they become minimally intrusive and exhibit inherent proactiveness and dynamic adaptability to the current conditions, u...
Maria Strimpakou, Ioanna Roussaki, Carsten Pils, M...