The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Notice of Violation of IEEE Publication Principles"Biologically Inspired Evolutionary Agent Systems in Dynamic Environments"by K.W. Yeom and J.H. Park in the Proceedings of the IEEE Congress on Evolutionary Computation, 2006. CEC 2006, pp.386-390After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found...
The emerging ubiquitous computing is changing the current computing paradigm, and it lets the ubiquitous RFID applications consistently and independently utilize the sensed information from the intelligent and powerful tags which are in a variety of applications fields. One of the most important issues is how to support the semantic consistency between data from various tags in different RFID applications...
The personalization of computing environments is one of the key aspects of ubiquitous computing, and such personalization requires isolated computing environments for better security and stability. In this paper, we propose a mutual authentication method using biometric information of each device users in a situation where device A communicates with device B which is in heterogenous environment. Proposed...
This paper proposes UbiMDR, a MDR (metadata registry)-based framework for supporting semantic consistency in ubiquitous computing environments. The chief objective of the UbiMDR is to let ubiquitous applications consistently and independently use information of sensors in a variety of sensor fields. Currently, applications depend on their sensor field. In other word, an application can utilize just...
Autonomic computing systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the traditional security model can not be applied to ACS any more. The goal of our research is to develop a context-based security model and architecture for ACS. Our focus is on self-protection feature of ACS. The self-protection...
As the adaptation of RFID technology is increased, the necessity of collaboration and cooperation between different RFID applications domains is getting more important. In this paper, we propose access control and authorization methodology for security of RFID multi-domain. We adopt security assertion markup language (SAML) and extensible access control markup language (XACML) to provide them. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.