Sciweavers

15 search results - page 2 / 3
» acsw 2003
Sort
View
ACSW
2003
13 years 7 months ago
Provably Secure Key Exchange: An Engineering Approach
We promote an engineering approach to design of provably secure key exchange protocols. Using the model of Canetti and Krawczyk we present a systematic method to arrive at efficie...
Yiu Shing Terry Tin, Colin Boyd, Juanma Gonz&aacut...
ACSW
2003
13 years 7 months ago
Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoom
This paper describes the development of a ubiquitous computing environment called the iRoom. Built from a foundation of the MIT Metaglue multi-agent software, a base level of func...
Jason B. Scholz, Mark W. Grigg, Paul Prekop, Mark ...
ACSW
2003
13 years 7 months ago
Flexible Enterprise Access Control with Object-oriented View Specification
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Given the increasing use of webbase...
Mark Evered
ACSW
2003
13 years 7 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton
ACSW
2003
13 years 7 months ago
Middleware for Context Sensitive Mobile Applications
Contextual information such as spatial location can significantly enhance the utility of mobile applications. We introduce the concept of active preferences that represent a comb...
Kenneth A. Hawick, Heath A. James