Sciweavers

2047 search results - page 63 / 410
» Pervasive Computing on Active Networks
Sort
View
PERCOM
2006
ACM
15 years 10 months ago
Criticality Aware Access Control Model for Pervasive Applications
In this paper we present a new framework for specifying access control policies in smart spaces called Criticality-Aware Access Control (CAAC). The main idea is to automatically r...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
PERCOM
2004
ACM
15 years 10 months ago
Pervasive Enablement of Business Processes
People are an important part of many business processes. Current workflow-based implementations of business processes constrain users to the desktop environment; require them to p...
Dipanjan Chakraborty, Hui Lei
SMC
2007
IEEE
154views Control Systems» more  SMC 2007»
15 years 5 months ago
From biology to evolve-able pervasive ICT systems
Abstract— The emergence of future pervasive ICT environments, characterized by the massive proliferation of embedded electronic devices with communication and computing capabilit...
Iacopo Carreras, Daniele Miorandi, Imrich Chlamtac
ZEUS
2010
154views Communications» more  ZEUS 2010»
15 years 3 days ago
Research challenges on person-centric flows
Research in the domain of Workflow Management focuses increasingly on service orchestrations. Often the fact is neglected that a huge part of the activities of business processes a...
Tobias Unger, Hanna Eberle, Frank Leymann
ISF
2008
114views more  ISF 2008»
14 years 10 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan