Sciweavers

6861 search results - page 25 / 1373
» Security for Ubiquitous Computing
Sort
View
106
Voted
MUE
2007
IEEE
105views Multimedia» more  MUE 2007»
15 years 10 months ago
A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems
Pho Duc Giang, Le Xuan Hung, Sungyoung Lee, Young-...
139
Voted
TROB
2002
120views more  TROB 2002»
15 years 3 months ago
DPAC: an object-oriented distributed and parallel computing framework for manufacturing applications
Parallel and distributed computing infrastructure are increasingly being embraced in the context of manufacturing applications, including real-time scheduling. In this paper, we pr...
N. R. Srinivasa Raghavan, Tanmay Waghmare
141
Voted
IHI
2010
160views Healthcare» more  IHI 2010»
14 years 10 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
153
Voted
MOBISYS
2008
ACM
16 years 3 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
127
Voted
SEUS
2010
IEEE
15 years 1 months ago
Ubiquitous Verification of Ubiquitous Systems
Abstract. Ubiquitous embedded computing systems expected to reliably perform one or more relevant tasks need design and verification methods currently not available. New envisioned...
Reinhard Wilhelm, Matteo Maffei