The focus of this work is developing processes to enable user-specified policies to help roaming users manage their interaction with a pervasive computing environment. A user-specified policy is a policy, defined by the user, which represents how she would prefer the pervasive computing environment to behave towards her. Towards realising such policies, two related research areas have to be enhanced. They are dynamic policy conflict detection and resolution and inter-domain policy negotiation. This report discusses the state of the art in related areas, and details the work carried out towards meeting the research objectives
As enterprises begin to increasingly conduct their businesses over multiple interconnected networks ...
Abstract. Policies are becoming increasingly important in modern computer systems as a mechanism for...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
The focus of this work is developing processes to enable user-specified policies to help roaming use...
Abstract: Provision of adaptive access control is key to allowing users harness the full potential o...
Provision of adaptive access control is key to allowing users harness the full potential of ubiquito...
This paper discusses some of the challenges encountered when using policy-based management to manage...
In this paper we describe a policy language designed for pervasive computing applications that is ba...
Pervasive systems are complex distributed systems containing heterogeneous and mobile devices, servi...
The new paradigm in mobile services lies in providing a location-based user experience and here lies...
Personal Mobility Management System, a distributed application developed at the Multimedia & Mobile ...
While developments in distributed object computing environments, such as the Common Object Request B...
Policies are becoming increasingly important in modern computer systems as a mechanism for end users...
Feature interaction is a problem mostly considered in the context of telephony features, but present...
Nowadays, application systems in pervasive computing have to be self-adaptive, which means adapting ...
As enterprises begin to increasingly conduct their businesses over multiple interconnected networks ...
Abstract. Policies are becoming increasingly important in modern computer systems as a mechanism for...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
The focus of this work is developing processes to enable user-specified policies to help roaming use...
Abstract: Provision of adaptive access control is key to allowing users harness the full potential o...
Provision of adaptive access control is key to allowing users harness the full potential of ubiquito...
This paper discusses some of the challenges encountered when using policy-based management to manage...
In this paper we describe a policy language designed for pervasive computing applications that is ba...
Pervasive systems are complex distributed systems containing heterogeneous and mobile devices, servi...
The new paradigm in mobile services lies in providing a location-based user experience and here lies...
Personal Mobility Management System, a distributed application developed at the Multimedia & Mobile ...
While developments in distributed object computing environments, such as the Common Object Request B...
Policies are becoming increasingly important in modern computer systems as a mechanism for end users...
Feature interaction is a problem mostly considered in the context of telephony features, but present...
Nowadays, application systems in pervasive computing have to be self-adaptive, which means adapting ...
As enterprises begin to increasingly conduct their businesses over multiple interconnected networks ...
Abstract. Policies are becoming increasingly important in modern computer systems as a mechanism for...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...