Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. In this paper we address securing cyber infrastructures for ubiquitous computing environments, like smart buildings and campuses. Our emphasis here is to construct a middleware-based critical cyber infrastructure (CCI) that encompasses heterogeneous components and binds networks, processors, and devices with mechanisms, protocols and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems, which are isolated from the public Internet, and are context insensitive. This leads to multiple subsystems that are incompatible and in...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
Abstract. A metacomputing environment is a collection of geographically distributed resources (peopl...
This paper appears in: Distributed Computing Systems Workshops, 2002. Proceedings. 22nd Internationa...
Ubiquitous computing is poised to have a profound effect on how humans interact with machines, physi...
Traditional authentication and access control are no longer suitable for ubiquitous computing paradi...
AbstractMost critical infrastructures can be modeled as cyber-physical systems whose cyber component...
The development of ubiquitous computing systems benefits tremendously from the service-oriented comp...
Evolving business models, computing paradigms, and management practices are rapidly re-shaping the u...
Today's critical infrastructures like the Power Grid are essentially physical processes controlled b...
The purpose of ubiquitous computing is anywhere and anytime access to information within computing i...
. A metacomputing environment is a collection of geographically distributed resources (people, compu...
We present a flexible architecture for trusted computing, called Terra, that allows applications wit...
The Personalization of computing environments is one of the key aspects of ubiquitous computing, and...
Modern technology and omnipresent computing and communication facilities are leading us closer to th...
The Internet of Things (IoT) is not one single entity, but a collection of different devices, commun...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
Abstract. A metacomputing environment is a collection of geographically distributed resources (peopl...
This paper appears in: Distributed Computing Systems Workshops, 2002. Proceedings. 22nd Internationa...
Ubiquitous computing is poised to have a profound effect on how humans interact with machines, physi...
Traditional authentication and access control are no longer suitable for ubiquitous computing paradi...
AbstractMost critical infrastructures can be modeled as cyber-physical systems whose cyber component...
The development of ubiquitous computing systems benefits tremendously from the service-oriented comp...
Evolving business models, computing paradigms, and management practices are rapidly re-shaping the u...
Today's critical infrastructures like the Power Grid are essentially physical processes controlled b...
The purpose of ubiquitous computing is anywhere and anytime access to information within computing i...
. A metacomputing environment is a collection of geographically distributed resources (people, compu...
We present a flexible architecture for trusted computing, called Terra, that allows applications wit...
The Personalization of computing environments is one of the key aspects of ubiquitous computing, and...
Modern technology and omnipresent computing and communication facilities are leading us closer to th...
The Internet of Things (IoT) is not one single entity, but a collection of different devices, commun...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
Abstract. A metacomputing environment is a collection of geographically distributed resources (peopl...
This paper appears in: Distributed Computing Systems Workshops, 2002. Proceedings. 22nd Internationa...