Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
A multilevel trust management framework in pervasive environment is proposed in this paper. In the framework, the trust, the reputation, reciprocity and related concepts are defined newly. The multilevel discrete trust metric finds a good way to solve the problems, which the granularity of binary trust is coarse and the calculation of continuous trust is complex. The design of storage counter in the...
Trust is a fundamental issue in Pervasive computing, especially when they are applied in unstructured P2P systems. The computational models of trust play an important role in determining who and how to interact in open and dynamic environments. However, current models are not efficient or scalable enough with the expansion of system. To this end, a computation trust model with confidence is proposed...
Deployment of applications and scientific workflows that require resources from multiple distributed platforms are fuelling the federation of autonomous clouds to create cyber infrastructure environments. As the scope of federated cloud computing enlarges to ubiquitous and pervasive computing, there will be a need to assess and maintain the trustworthiness of the cloud computing entities. In this...
Society has grown increasingly reliant on technologies that allow the reproduction of both physical and abstract entities. The ease with which content can be copied has brought widespread benefits, however in many cases these benefits are also contingent on a suitable counter balance of content protection, allowing the process of copying to be restricted in certain circumstances. Dissemination of...
Cloud computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that chief information officers (CIOs) and their colleagues hesitate to let their business workloads to move from private cloud into public cloud is security. This work tries to offer a line of defense by applying mobile agents...
This paper presents bilateral key handshaking method between patient and medical people. It builds using pseudo inverse matrix investigates to attack an adaptation layer of IP-USNs (IP-base ubiquitous sensor network). It is a healthcare facilities technique among medical people and patient to convey biomedical data accurately and securely. However, the implementation presents a secure global healthcare...
This paper presents an architectural model for wireless peer-to-peer (WP2P) file sharing system for ubiquitous mobile devices. File sharing is one of the rationales for computer networks with increasing demand for file sharing applications and technologies in small and large enterprise networks and on the Internet. With the popularity of mobile phones in day-to-day activities, P2P file sharing in...
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around distributed trust management. While such mechanisms are effective in specific environments, there is no generic framework for deploying and extending these mechanisms over a variety of pervasive systems. We present the design...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.