出生 发表于 2025-3-30 09:14:11

http://reply.papertrans.cn/87/8636/863592/863592_51.png

Mindfulness 发表于 2025-3-30 13:25:31

Dependability Issues of Pervasive Computing in a Healthcare Environmentnological perspective, arguing that it provides a wide range of possible applications of pervasive computing technology. We further recognize that pervasive computing technology is likely to create concerns about the security of healthcare systems, due to increased data aggregation, ubiquitous acces

Fermentation 发表于 2025-3-30 19:44:16

Protecting Security Policies in Ubiquitous Environments Using One-Way Functionspolicy of an Intrusion Detection System or the filtering policy of a firewall. Unauthorized disclosure of such information can reveal the fundamental principles and methods for the protection of the whole network, especially in ubiquitous environments where a large number of nodes store knowledge ab

KEGEL 发表于 2025-3-31 00:27:33

Enforcing Security Policies via Typesith code mobility, traditional solutions based on cryptography cannot deal with all security issues and additional mechanisms are necessary. In this paper, we present a flexible and expressive type system for security for a calculus of distributed and mobile processes. The type system has been desig

流动才波动 发表于 2025-3-31 03:04:04

http://reply.papertrans.cn/87/8636/863592/863592_55.png

小口啜饮 发表于 2025-3-31 06:09:13

Authentication for Pervasive Computingver, sound key management itself depends critically on sound authentication. In this paper we review current notions of entity authentication and discuss why we believe these notions are unsuitable for the pervasive domain. We then present our views on how notions of authentication should be revised

航海太平洋 发表于 2025-3-31 10:22:20

End-to-End Trust Starts with Recognitiono building this trust which differs from starting from more traditional authentication methods. We also argue for the concept of a ”pluggable” recognition module which allows different recognition schemes to be used in different circumstances. Finally, we propose that the trust in the underlying inf

爱得痛了 发表于 2025-3-31 16:02:44

http://reply.papertrans.cn/87/8636/863592/863592_58.png

minaret 发表于 2025-3-31 17:45:45

http://reply.papertrans.cn/87/8636/863592/863592_59.png

阴谋 发表于 2025-4-1 01:42:54

http://reply.papertrans.cn/87/8636/863592/863592_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Security in Pervasive Computing; First International Dieter Hutter,Günter Müller,Markus Ullmann Conference proceedings 2004 The Editor(s)