Sciweavers

202 search results - page 4 / 41
» Managing Pervasive Environment Privacy Using the
Sort
View
PERCOM
2006
ACM
16 years 4 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
POLICY
2005
Springer
15 years 10 months ago
Managing the Policies of Non-Technical Users in a Dynamic World
In this paper, we describe the use of description logic as the basis for a policy representation language and show how it is used in our implementation of a policy managed pervasi...
Tim Owen, Ian Wakeman, Bill Keller, Julie Weeds, D...
WOA
2003
15 years 5 months ago
Using a Properties Based Naming System in Mobile Agents Environments for Pervasive Computing
— Mobile Agents model is widely accepted as a good solution to simplify the coordination in a complex and distributed environment. Pervasive computing, presents many issues regar...
Fabio Tarantino, Alessio Ravani, Mario Zambrini
PDPTA
2003
15 years 5 months ago
Mobile Agents for Pervasive Computing Using a Novel Method of Message Passing
- Pervasive computing is an emerging technology that brings new dimensions to distributed computing; it uses a wide variety of smart, ubiquitous devices throughout an individual’...
David Levine, Renjith Thomas, Farhad Kamangar, Ger...
ISPAN
2009
IEEE
15 years 11 months ago
SoCQ: A Framework for Pervasive Environments
Abstract—Querying non-conventional data sources is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is...
Yann Gripay, Frédérique Laforest, Je...