The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In WSN-based surveillance systems power conservation is an important issue but one must also ensure that the application's objectives are met. In this paper, we jointly address the problem of coverage, disambigation and adaptive scheduling of sensor node's activity to extend the network lifetime while fulfilling a critical surveillance application needs. We first present a distributed algorithm that...
Trust based access control models have recently attracted significant interest in the area of pervasive computing. In several trust based models, organizations are required to establish a set of trust beliefs regarding their neighboring nodes. In an organization there may be multiple administrators or the administrators may change with time. When multiple administrators contribute to the creation...
Nowadays the exchange of documents, information and data is fulfilled through an electronic format. This arises security problems (i.e. Authentication, non repudiation and privacy). In order to tackle some security issues, the digital signature allows to strongly identify the signatory and prevents against any signed content violation. However with the evolution of distributed systems, context adaptation...
In distributed systems especially in pervasive environments, the users usually face difficulties to obtain permissions to use the surrounding resources. Either they have an account locally, or they can show a certificate obtained beforehand given them the access. Problems arise when they arrive in an unknown environment occurring in a pervasive environment. In this paper, we propose the Chameleon...
The convergence between Grid and Pervasive computing environments lead to the Pervasive Grids paradigm. This new paradigm gives birth to some new security challenges related to adhoc authentication and privacy protection. In distributed systems, and especially in pervasive grid environments, the users usually face difficulties to obtain permissions to use the resources from the sites they visit. Either...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.