Sciweavers

391 search results - page 45 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
SAC
2006
ACM
14 years 11 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
CCS
2008
ACM
15 years 1 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
HICSS
2008
IEEE
211views Biometrics» more  HICSS 2008»
15 years 6 months ago
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks
—In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenti...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
OTM
2005
Springer
15 years 5 months ago
Modelling Context Information with ORM
Context-aware applications rely on implicit forms of input, such as sensor-derived data, in order to reduce the need for explicit input from users. They are especially relevant for...
Karen Henricksen, Jadwiga Indulska, Ted McFadden
MIDDLEWARE
2004
Springer
15 years 5 months ago
Mobile adaptive tasks guided by resource contracts
This paper proposes a way to realize the idea of calm computing by adding a dynamic task model into the pervasive computing environment. This task model contains information about...
Peter Rigole, Yolande Berbers, Tom Holvoet