This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
Ambient Sites are proximal. At our fingertips, under the soles of our feet, along the edge of a cheek, they are characterized by the permeability of boundaries, the sudden awarene...
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Integrating complex enterprise systems is challenging and reliability and performance of the integrated systems can be problematic when using typical solutions of distributed tran...
John C. Grundy, Jun Bai, John Blackham, John G. Ho...
Mobile display devices such as phones and PDAs have become very widely available and used. However, most content on these devices is limited to text, static images and motion vide...