Sciweavers

6861 search results - page 138 / 1373
» Security for Ubiquitous Computing
Sort
View
CCS
2004
ACM
15 years 9 months ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers
ARCS
2005
Springer
15 years 9 months ago
Towards Autonomic Networking Using Overlay Routing Techniques
With an ever-growing number of computers being embedded into our surroundings, the era of ubiquitous computing is approaching fast. However, as the number of networked devices incr...
Kendy Kutzner, Curt Cramer, Thomas Fuhrmann
HUC
2010
Springer
15 years 5 months ago
Surprise trips: a system to augment the natural experience of exploration
Little treasures in nature often go unnoticed by visitors when roaming about in a national park. Ubiquitous technology with its less intrusive character may be apt to enhance this...
Matthias Korn, Raghid Kawash, Lisbet Andersen
WWW
2010
ACM
15 years 11 months ago
Malicious interface design: exploiting the user
In an ideal world, interface design is the art and science of helping users accomplish tasks in a timely, efficient, and pleasurable manner. This paper studies the inverse situati...
Gregory J. Conti, Edward Sobiesk