Sciweavers

271 search results - page 8 / 55
» Ubiquitous Internet Access Control: The PAPI System
Sort
View
PET
2004
Springer
15 years 3 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
PERCOM
2010
ACM
14 years 8 months ago
Collaborative municipal Wi-Fi networks - challenges and opportunities
Abstract—Municipal Wi-Fi networks aim at providing Internet access and selected mobile network services to citizens, travelers, and civil servants. The goals of these networks ar...
Tobias Heer, René Hummen, Nicolai Viol, Han...
SOUPS
2009
ACM
15 years 4 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
SACMAT
2004
ACM
15 years 3 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
ICECCS
2008
IEEE
168views Hardware» more  ICECCS 2008»
15 years 4 months ago
Ubiquitous Service Regulation Based on Dynamic Rules
Ubiquitous computing systems can be regarded as open systems where heterogeneous and previously unknown entities may spontaneously interact, due to intrinsic mobility of users and...
José Viterbo Filho, Markus Endler, Jean-Pie...