• Aucun résultat trouvé

[PDF] Top 20 Context-aware and Attribute-based Access Control Applying Proactive Computing to IoT System

Has 10000 "Context-aware and Attribute-based Access Control Applying Proactive Computing to IoT System" found on our website. Below are the top 20 most common "Context-aware and Attribute-based Access Control Applying Proactive Computing to IoT System".

Context-aware and Attribute-based Access Control Applying Proactive Computing to IoT System

Context-aware and Attribute-based Access Control Applying Proactive Computing to IoT System

... Things, Access Control, ABAC, Event Analysis, Proactive Computing Abstract: ABAC allows for high flexibility in access control over a system through the definition of ... Voir le document complet

8

A dynamic trust-based context-aware secure authentication framework for pervasive computing environments

A dynamic trust-based context-aware secure authentication framework for pervasive computing environments

... a context-based resource, C i is promoted to present not only identity credentials but also all the required contextual information and bundle them with the ac- cess request that is sent ... Voir le document complet

196

Context-Aware Access Control for RDF Graph Stores

Context-Aware Access Control for RDF Graph Stores

... granularity and we do not rely on access control lists. Sacco and Passant [17] present the PPO ...PPO and SHI3LD are the use of the ASK queries for representing the access ... Voir le document complet

7

2017 — Context and resource aware cloud-based solution for efficient and scalable multi-persona mobile computing

2017 — Context and resource aware cloud-based solution for efficient and scalable multi-persona mobile computing

... layer to run multiple virtual instances on a single operating system [Andrus et ...able to ensure that the virtual environments are completely independent, secure from each other and any ... Voir le document complet

194

Enhancing context data distribution for the internet of things using qoc-awareness and attribute-based access control

Enhancing context data distribution for the internet of things using qoc-awareness and attribute-based access control

... granting access to consumers based on their intended use of context ...Role-Based Access Control (RBAC) into publish/subscribe ...stable computing environments ... Voir le document complet

13

Context-aware access control and presentation of linked data

Context-aware access control and presentation of linked data

... Prism to the actual context is selected, and the embedded formatting direc- tives are used to visualize the desired ...with context awareness, thus enabling developers to declare ... Voir le document complet

145

Towards A Model Of Context-aware Infrastructure In Mobile Ubiquitous Computing

Towards A Model Of Context-aware Infrastructure In Mobile Ubiquitous Computing

... terminal and environment profile Context awareness is emerging as an essential feature for the next generation of mobile ...The context defining a mobile service request as being described by a set ... Voir le document complet

11

CLRPL: Context-Aware and Load Balancing RPL for Iot Networks Under Heavy and Highly Dynamic Load

CLRPL: Context-Aware and Load Balancing RPL for Iot Networks Under Heavy and Highly Dynamic Load

... TERMS Context-aware routing, Internet of Things, heavy load, network lifetime, packet loss, dynamic ...grown to be a hot topic among researchers across the ...industry, and healthcare due ... Voir le document complet

15

Linked Data Access Goes Mobile: Context-Aware Authorization for Graph Stores

Linked Data Access Goes Mobile: Context-Aware Authorization for Graph Stores

... (our Access Privilege) and environment (our Environment ...model to the Web of ...RBAC to capture the context of the environment in which the access requests are ...propose ... Voir le document complet

9

Energy-aware Cache Placement Scheme for IoT-based ICN Networks

Energy-aware Cache Placement Scheme for IoT-based ICN Networks

... Media Access Control (MAC) address in ...ing, and unicast for data ...used to enhance the energy during the forwarding, the use of MAC addresses brings ICN paradigm back to the ... Voir le document complet

7

Context-aware decision making under uncertainty for voice-based control of smart home

Context-aware decision making under uncertainty for voice-based control of smart home

... SWEET-HOME SYSTEM 4.3 Raw and inferred information Briefly, the audio events are detected in real-time by an adaptive threshold algorithm based on a wavelet analysis and a SNR ... Voir le document complet

38

An approach to monitoring system based on cloud for IoT

An approach to monitoring system based on cloud for IoT

... P.Sethi and al[ 23 ] define The Internet of Tings (IoT) as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful ... Voir le document complet

71

QOS-Aware and Status-Aware Adaptive Resource Allocation Framework in SDN-Based IOT Middleware

QOS-Aware and Status-Aware Adaptive Resource Allocation Framework in SDN-Based IOT Middleware

... processing, and memory. Additionally, they are made of heterogeneous nodes and often operate in the dynamic and unpredictable ...in IoT and accuracy as some of the critical QoS ... Voir le document complet

124

A didactic-based model of scenarios for designing an adaptive and context-Aware Learning System

A didactic-based model of scenarios for designing an adaptive and context-Aware Learning System

... learning system for probationary teachers, based on real practices and teacher ...static and dynamic aspects: properties, theory and applications” for different categories of ... Voir le document complet

9

B-PERFect - Applying the PERF Approach to B Based System Developments

B-PERFect - Applying the PERF Approach to B Based System Developments

... B to HLL is not straightforward. The first issue to handle is the semantic mismatch between the two ...has to be given to several notions like variable values evolution and updates or ... Voir le document complet

14

B-PERFect - Applying the PERF Approach to B Based System Developments

B-PERFect - Applying the PERF Approach to B Based System Developments

... b2llvm to auto- mate the code generation ...generator to produce C code from Event-B ...is to produce C code from Event-B specification using an intermediate HLL ...representation. To our ... Voir le document complet

15

Trusted Access Control System for Smart Campus

Trusted Access Control System for Smart Campus

... mobile computing solutions have been proposed among which are the Trusted Execution Environment ...(processor) and a software part (Secure Operating System) that allows the secure storage and ... Voir le document complet

8

Authentication and access control based on distributed ledger technology

Authentication and access control based on distributed ledger technology

... Point, Attribute Managers, Policy Information Points, Policy Decision Point as the evaluation engine that takes a policy, an access request in order to access ...user and role ... Voir le document complet

9

Adaptive load control for IoT based on satellite communications

Adaptive load control for IoT based on satellite communications

... load control mechanisms for a satellite system dedicated to the ...load control mechanisms are essential for satellites since millions of devices could be within their coverage (50 000 devices ... Voir le document complet

8

An Event-Based Coordination Model for Context-Aware Applications

An Event-Based Coordination Model for Context-Aware Applications

... pervasive system [21]. The framework manages policies based on the Event-Condition-Action pattern: a policy defines an action to be performed when an event occurs under a given ...holds, and ... Voir le document complet

18

Show all 10000 documents...