Sciweavers

2337 search results - page 94 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
ACSW
2003
14 years 11 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton
BEHAVIOURIT
2005
54views more  BEHAVIOURIT 2005»
14 years 10 months ago
Understanding and modelling built environments for mobile guide interface design
The research presented in this paper aims to inform interface design for mobile guides by understanding and modelling the built environments in which the guide will be used. This ...
Jeni Paay, Jesper Kjeldskov
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
15 years 4 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
WWW
2011
ACM
14 years 5 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
MOBICOM
2010
ACM
14 years 10 months ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun