Now showing items 11-15 of 15
In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks
Current research on data management in mobile ad-hoc networks focuses on discovering sources and acquiring information. In this mode of operation, mobile devices assume answers to be correct and do not verify the veracity ...
Authorization and Privacy for Semantic Web Services
When choosing, composing, invoking or monitoring a service it may be important or even critical to understand it's security attributes and policies. By security, we refer to a range of related aspects including authentication, ...
Information agents for mobile and embedded devices
(World Scientific Publishing Co Pte Ltd, 2002-09-01)
The pervasive computing environments of the near future will involve the interactions, coordination and cooperation of numerous, casually accessible, and often invisible computing devices. These devices, whether carried ...
PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments
Healthcare today is moving away from the tethered domain and becoming diffused into an environment rich with portable digital devices. In this evolving environment, the need to deliver information such as Electronic Patient ...
A Policy Language for A Pervasive Computing Environment
We describe a policy language designed for pervasive computing applications that is based on deontic concepts and grounded in a semantic language. The pervasive computing environments under consideration are those in which ...