메뉴 건너뛰기




Volumn , Issue , 2007, Pages 303-308

S-MARKS: A middleware secure by design for the pervasive computing environment

Author keywords

[No Author keywords available]

Indexed keywords

CONSTRAINT THEORY; PORTABLE EQUIPMENT; SECURITY OF DATA; UBIQUITOUS COMPUTING;

EID: 34548120900     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITNG.2007.172     Document Type: Conference Paper
Times cited : (7)

References (33)
  • 1
    • 84976653144 scopus 로고
    • Some computer science issues in ubiquitous computing
    • M. Weiser, "Some computer science issues in ubiquitous computing," Communications of the ACM, vol. 36(7), 1993, pp.75-84.
    • (1993) Communications of the ACM , vol.36 , Issue.7 , pp. 75-84
    • Weiser, M.1
  • 2
    • 0010602271 scopus 로고    scopus 로고
    • System Software for Ubiquitous Computing
    • January-March
    • T. Kindberg, and A. Fox, "System Software for Ubiquitous Computing," IEEE Pervasive Computing, January-March, 2002, pp. 70-81.
    • (2002) IEEE Pervasive Computing , pp. 70-81
    • Kindberg, T.1    Fox, A.2
  • 4
    • 0036999904 scopus 로고    scopus 로고
    • F. Stajano, and R. Anderson, The Resurrecting Duckling: Security Issues for Ubiquitous Computing, Computer, 35(4), Part Supplement, April 2002, pp. 22-26.
    • F. Stajano, and R. Anderson, "The Resurrecting Duckling: Security Issues for Ubiquitous Computing," Computer, vol. 35(4), Part Supplement, April 2002, pp. 22-26.
  • 5
    • 0013413164 scopus 로고    scopus 로고
    • Security for Ubiquitous Computing
    • February
    • F. Stajano, "Security for Ubiquitous Computing," Wiley, February 2002, pp. 110-111.
    • (2002) Wiley , pp. 110-111
    • Stajano, F.1
  • 6
    • 0035577649 scopus 로고    scopus 로고
    • Trust-based Security in Pervasive Computing Environments
    • December
    • L. Kagal, T. Finin, A. Joshi, "Trust-based Security in Pervasive Computing Environments," Computer, vol. 34(12), December 2001, pp.154-157.
    • (2001) Computer , vol.34 , Issue.12 , pp. 154-157
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 8
    • 0035428427 scopus 로고    scopus 로고
    • Pervasive Computing: Vision and Challenges
    • August
    • M. Satyanarayanan, "Pervasive Computing: Vision and Challenges," IEEE Wireless Communications, vol. 8(4), August 2001, pp.10-17.
    • (2001) IEEE Wireless Communications , vol.8 , Issue.4 , pp. 10-17
    • Satyanarayanan, M.1
  • 9
    • 2942524994 scopus 로고    scopus 로고
    • Location Privacy in pervasive Computing
    • Jan-Mar
    • A.R. Beresford, F. Stajano, "Location Privacy in pervasive Computing," Pervasive Computing, IEEE, vol. 2(1), Jan-Mar 2003, pp. 46-55.
    • (2003) Pervasive Computing, IEEE , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 10
    • 34548121634 scopus 로고    scopus 로고
    • R. Campbell, J. Al-Muhtadi, P. Naldurg, G. Sampemanel, and M. D. Mickunas, Towards security and privacy for pervasive computing, In Proceedings of International Symposium on Software Security, Tokyo, Japan, 2002.
    • R. Campbell, J. Al-Muhtadi, P. Naldurg, G. Sampemanel, and M. D. Mickunas, "Towards security and privacy for pervasive computing," In Proceedings of International Symposium on Software Security, Tokyo, Japan, 2002.
  • 11
    • 84945556728 scopus 로고    scopus 로고
    • M. Langheinrich, Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems, In Proceedings of the 3rd international Conference on Ubiquitous Computing, Atlanta, Georgia, USA, 2001.
    • M. Langheinrich, "Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems," In Proceedings of the 3rd international Conference on Ubiquitous Computing, Atlanta, Georgia, USA, 2001.
  • 13
    • 34548115511 scopus 로고    scopus 로고
    • L. Capra, W. Emmerich, and C. Mascolo, Reflective Middleware Solutions for Context-Aware Applications, In Proceedings of the Third international Conference on Metalevel Architectures and Separation of Crosscutting Concerns, September 25 - 28, 2001.
    • L. Capra, W. Emmerich, and C. Mascolo, "Reflective Middleware Solutions for Context-Aware Applications," In Proceedings of the Third international Conference on Metalevel Architectures and Separation of Crosscutting Concerns, September 25 - 28, 2001.
  • 14
    • 33750809662 scopus 로고    scopus 로고
    • MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments
    • M. Sharmin, S. Ahmed, S. I. Ahamed, "MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments," Third International Conference on Information Technology: New Generations (ITNG'06), 2006. pp. 306-313.
    • (2006) Third International Conference on Information Technology: New Generations (ITNG'06) , pp. 306-313
    • Sharmin, M.1    Ahmed, S.2    Ahamed, S.I.3
  • 16
    • 0002159443 scopus 로고    scopus 로고
    • The Oxygen Project
    • August
    • M. Dertouzos, "The Oxygen Project," Scientific American, vol. 281(2), August 1999, pp. 52-63.
    • (1999) Scientific American , vol.281 , Issue.2 , pp. 52-63
    • Dertouzos, M.1
  • 19
    • 34548114137 scopus 로고    scopus 로고
    • Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS-21)
    • May2001
    • A. L. Murphy, G. P. Picco, and G. C. Roman, "Lime: A Middleware for Physical and Logical Mobility," Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS-21), May2001.
    • Murphy, A.L.1    Picco, G.P.2    Roman, G.C.3
  • 21
    • 34548123421 scopus 로고    scopus 로고
    • R. Cerqueira, C. K. Hess, M. Roman, and R. H. Campbell, Gaia: A Development Infrastructure for Active Spaces, In Workshop on Application Models and Programming Tools for Ubiquitous Computing (held in conjunction with the UBICOMP 2001), Sept. 2001.
    • R. Cerqueira, C. K. Hess, M. Roman, and R. H. Campbell, "Gaia: A Development Infrastructure for Active Spaces," In Workshop on Application Models and Programming Tools for Ubiquitous Computing (held in conjunction with the UBICOMP 2001), Sept. 2001.
  • 22
    • 0036391999 scopus 로고    scopus 로고
    • S.S. Yau, W. Yu, and F. Karim, Development of situation-aware application software for ubiquitous computing environments, Computer Software and Applications Conference COMPSAC 2002, 2002, pp. 233-238
    • S.S. Yau, W. Yu, and F. Karim, "Development of situation-aware application software for ubiquitous computing environments," Computer Software and Applications Conference (COMPSAC 2002), 2002, pp. 233-238.
  • 24
    • 26444441760 scopus 로고    scopus 로고
    • Alice: Modularization of Middleware using Aspect-Oriented Programming
    • 20-21 September, Linz, Austria
    • M. Eichberg, and M. Mezini, "Alice: Modularization of Middleware using Aspect-Oriented Programming," Software Engineering and Middleware (SEM 2004), 20-21 September 2004, Linz, Austria.
    • (2004) Software Engineering and Middleware (SEM 2004)
    • Eichberg, M.1    Mezini, M.2
  • 25
    • 24744432052 scopus 로고    scopus 로고
    • M. Sharmin, S. Ahmed, S. I. Ahamed, SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) in Pervasive Computing Environments, International Conference on Information Technology: Coding and Computing (ITCC'05) II), 2005, pp. 271-276.
    • M. Sharmin, S. Ahmed, S. I. Ahamed, "SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) in Pervasive Computing Environments," International Conference on Information Technology: Coding and Computing (ITCC'05) vol (II), 2005, pp. 271-276.
  • 27
    • 14844324416 scopus 로고    scopus 로고
    • A Secure Human Computer Authentication Scheme
    • Technical Report CMU-CS-00-139, Carnegie Mellon University
    • N. Hopper and M. Blum, "A Secure Human Computer Authentication Scheme," Technical Report CMU-CS-00-139, Carnegie Mellon University, 2000.
    • (2000)
    • Hopper, N.1    Blum, M.2
  • 29
    • 0012625167 scopus 로고    scopus 로고
    • What Do Our Metrics Mean?
    • April
    • R. E. Zultner, "What Do Our Metrics Mean?," Cutter IT Journal, vol. 12(4), April 1999, pp. 11-19.
    • (1999) Cutter IT Journal , vol.12 , Issue.4 , pp. 11-19
    • Zultner, R.E.1
  • 30
    • 34548114135 scopus 로고    scopus 로고
    • M. Abramowitz and I. A. Stegun, eds. (1972) Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. New York: Dover. See Section 26.7
    • M. Abramowitz and I. A. Stegun, eds. (1972) Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. New York: Dover. (See Section 26.7
  • 31
    • 0345399126 scopus 로고
    • The probable error of a mean
    • W.S. Gossett, "The probable error of a mean," Biometrika, vol. 6(1), 1908, pp. 1-25.
    • (1908) Biometrika , vol.6 , Issue.1 , pp. 1-25
    • Gossett, W.S.1
  • 32
    • 0017983865 scopus 로고
    • Binary Decision Diagrams
    • June
    • S. B. Akers, "Binary Decision Diagrams," IEEE Transactions on Computers, C-27(6), June 1978, pp. 509-516.
    • (1978) IEEE Transactions on Computers , vol.C-27 , Issue.6 , pp. 509-516
    • Akers, S.B.1
  • 33
    • 0022769976 scopus 로고
    • Graph-based Algorithms for Boolean Function Manipulation
    • R. E. Bryant, "Graph-based Algorithms for Boolean Function Manipulation," IEEE Transactions on Computers, C-35(8), 1986, pp. 677-691.
    • (1986) IEEE Transactions on Computers , vol.C-35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.