Sciweavers

490 search results - page 76 / 98
» Protocols for Mobile Devices Integration in Heterogeneous En...
Sort
View
OTM
2007
Springer
15 years 3 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
ACSAC
2006
IEEE
15 years 3 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz
83
Voted
GI
2009
Springer
14 years 7 months ago
Spontaneous and Privacy-friendly Mobile Indoor Routing and Navigation
Abstract: Mobile indoor navigation systems guide users through buildings and premises by taking into account the current position of the user and a destination such as a room, offi...
Peter Ruppel, Florian Gschwandtner
SUTC
2008
IEEE
15 years 4 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
ICDIM
2010
IEEE
14 years 7 months ago
Complementarity of process-oriented and ontology-based context managers to identify situations
One issue for context-aware applications is to identify without delay situations requiring reactions. The identification of these situations is computed from both dynamic context ...
Amel Bouzeghoub, Chantal Taconet, Amina Jarraya, N...