[PDF][PDF] A Framework for User-centric Autonomic Management

JP Barraca, RL Aguiar - researchgate.net
This paper presents a novel autonomic management framework for user-centric networks.
The framework assumes users are directly involved, or have direct interest, on their …

[HTML][HTML] EPSRC WINES Proposal

M Sloman, GZ Yang, O Wells, C Toumazou, T Cass… - doc.ic.ac.uk
Background The UbiCare Centre: Ubiquitous Computing for Healthcare in the Community is
based at Imperial College London and consists of a number of collaborative projects funded …

Policy-based routing for mobile ad hoc networks running HTR protocol

GCM Souza - 2013 - repositorio.ufpe.br
The increasing growth of mobile devices in the whole world, and the forecasts for the coming
years has been indicated by several reports. Nonetheless, this need for ubiquitous …

[图书][B] A security framework to cope with node misbehaviors in mobile ad hoc networks

W Li - 2011 - search.proquest.com
Abstract A Mobile Ad-hoc NETwork (MANET) has no fixed infrastructure, and is generally
composed of a dynamic set of cooperative peers. These peers share their wireless …

Authentication and Trust Relationship Chaining for Resource Sharing Community

JG Kim, SK Kim - Journal of Korea Society of Digital Industry and …, 2010 - koreascience.kr
This article proposed the authentication protocol for peer-to-peer resource sharing
community. The proposed protocol does not require a priori information for generating and …

[PDF][PDF] PRiMMA: Privacy Rights Management for Mobile Applications

B Nuseibeh, A Bandara, B Price, A Joinson, Y Rogers… - academia.edu
The age of Ubiquitous Computing is approaching fast: most people in the UK over the age of
8 carry mobile phones [5], which are becoming increasingly sophisticated interactive …

[PDF][PDF] D2. 1 Taxonomy

T Scherner - 2008 - picos-project.eu
The objective of the PICOS project in general is to advance state of the art technologies that
provide privacy-enhanced identity and trust management features within complex …

[图书][B] Resilient Networks and Services: Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany …

D Hausheer, S Jürgen - 2008 - books.google.com
This volume of the Lecture Notes in Computer Science series contains the papers accepted
for presentation at the Second International Conference on Autonomous Infrastructure …

[PDF][PDF] Analysis and Synthesis of Authentication and Authorisation Mechanisms Against Subterfuge

AMA Subterfuge - 2007 - Citeseer
Modern networks are intended to support collaborations between large numbers of
autonomous entities. A coalition provides a virtual space across a network that allows its …

[PDF][PDF] Policy Issues for Pervasive Systems.

M Sloman - FIW, 2005 - researchgate.net
Pervasive or ubiquitous computing systems consist of large numbers of 'invisible'computers
embedded into the environment which may interact with mobile users or form intelligent …