[PDF][PDF] A Framework for User-centric Autonomic Management
JP Barraca, RL Aguiar - researchgate.net
This paper presents a novel autonomic management framework for user-centric networks.
The framework assumes users are directly involved, or have direct interest, on their …
The framework assumes users are directly involved, or have direct interest, on their …
[HTML][HTML] EPSRC WINES Proposal
Background The UbiCare Centre: Ubiquitous Computing for Healthcare in the Community is
based at Imperial College London and consists of a number of collaborative projects funded …
based at Imperial College London and consists of a number of collaborative projects funded …
Policy-based routing for mobile ad hoc networks running HTR protocol
GCM Souza - 2013 - repositorio.ufpe.br
The increasing growth of mobile devices in the whole world, and the forecasts for the coming
years has been indicated by several reports. Nonetheless, this need for ubiquitous …
years has been indicated by several reports. Nonetheless, this need for ubiquitous …
[图书][B] A security framework to cope with node misbehaviors in mobile ad hoc networks
W Li - 2011 - search.proquest.com
Abstract A Mobile Ad-hoc NETwork (MANET) has no fixed infrastructure, and is generally
composed of a dynamic set of cooperative peers. These peers share their wireless …
composed of a dynamic set of cooperative peers. These peers share their wireless …
Authentication and Trust Relationship Chaining for Resource Sharing Community
JG Kim, SK Kim - Journal of Korea Society of Digital Industry and …, 2010 - koreascience.kr
This article proposed the authentication protocol for peer-to-peer resource sharing
community. The proposed protocol does not require a priori information for generating and …
community. The proposed protocol does not require a priori information for generating and …
[PDF][PDF] PRiMMA: Privacy Rights Management for Mobile Applications
The age of Ubiquitous Computing is approaching fast: most people in the UK over the age of
8 carry mobile phones [5], which are becoming increasingly sophisticated interactive …
8 carry mobile phones [5], which are becoming increasingly sophisticated interactive …
[PDF][PDF] D2. 1 Taxonomy
T Scherner - 2008 - picos-project.eu
The objective of the PICOS project in general is to advance state of the art technologies that
provide privacy-enhanced identity and trust management features within complex …
provide privacy-enhanced identity and trust management features within complex …
[图书][B] Resilient Networks and Services: Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany …
D Hausheer, S Jürgen - 2008 - books.google.com
This volume of the Lecture Notes in Computer Science series contains the papers accepted
for presentation at the Second International Conference on Autonomous Infrastructure …
for presentation at the Second International Conference on Autonomous Infrastructure …
[PDF][PDF] Analysis and Synthesis of Authentication and Authorisation Mechanisms Against Subterfuge
AMA Subterfuge - 2007 - Citeseer
Modern networks are intended to support collaborations between large numbers of
autonomous entities. A coalition provides a virtual space across a network that allows its …
autonomous entities. A coalition provides a virtual space across a network that allows its …
[PDF][PDF] Policy Issues for Pervasive Systems.
M Sloman - FIW, 2005 - researchgate.net
Pervasive or ubiquitous computing systems consist of large numbers of 'invisible'computers
embedded into the environment which may interact with mobile users or form intelligent …
embedded into the environment which may interact with mobile users or form intelligent …