Graph-Based Algorithms for Boolean Function Manipulation
IEEE Transactions on Computers
Some computer science issues in ubiquitous computing
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Mobiware: QOS-aware middleware for mobile multimedia communications
HPN '97 Proceedings of the IFIP TC6 seventh international conference on High performance netwoking VII
Understanding and Using Context
Personal and Ubiquitous Computing
XMIDDLE: A Data-Sharing Middleware for Mobile Computing
Wireless Personal Communications: An International Journal
System Software for Ubiquitous Computing
IEEE Pervasive Computing
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Development of Situation-Aware Application Software for Ubiquitous Computing Environment
COMPSAC '02 Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment
Aura: an Architectural Framework for User Mobility in Ubiquitous Computing Environments
WICSA 3 Proceedings of the IFIP 17th World Computer Congress - TC2 Stream / 3rd IEEE/IFIP Conference on Software Architecture: System Design, Development and Maintenance
Reflective Middleware Solutions for Context-Aware Applications
REFLECTION '01 Proceedings of the Third International Conference on Metalevel Architectures and Separation of Crosscutting Concerns
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Noise-tolerant learning, the parity problem, and the statistical query model
Journal of the ACM (JACM)
LIME: A Middleware for Physical and Logical Mobility
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks
COMPSAC '03 Proceedings of the 27th Annual International Conference on Computer Software and Applications
Improving Security for Ubiquitous Campus Applications
SAINT-W '04 Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
IBM Systems Journal
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Handbook of Mathematical Functions, With Formulas, Graphs, and Mathematical Tables,
Handbook of Mathematical Functions, With Formulas, Graphs, and Mathematical Tables,
ITNG '06 Proceedings of the Third International Conference on Information Technology: New Generations
Avoiding Privacy Violations Caused by Context-Sensitive Services
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
An Adaptive Lightweight Trust Reliant Secure Resource Discovery for Pervasive Computing Environments
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
HB-MP: A further step in the HB-family of lightweight authentication protocols
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
PRIVE: anonymous location-based queries in distributed mobile systems
Proceedings of the 16th international conference on World Wide Web
S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment
ITNG '07 Proceedings of the International Conference on Information Technology
An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 01
IEEE Transactions on Computers
PICO: A Middleware Framework for Pervasive Computing
IEEE Pervasive Computing
FPCS: A Formal Approach for Privacy-Aware Context-Based Services
COMPSAC '08 Proceedings of the 2008 32nd Annual IEEE International Computer Software and Applications Conference
TRULLO - local trust bootstrapping for ubiquitous devices
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
TATA: towards anonymous trusted authentication
iTrust'06 Proceedings of the 4th international conference on Trust Management
Alice: modularization of middleware using aspect-oriented programming
SEM'04 Proceedings of the 4th international conference on Software Engineering and Middleware
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
On the inherent intractability of certain coding problems (Corresp.)
IEEE Transactions on Information Theory
Hi-index | 0.00 |
As portable devices have become a part of our everyday life, more people are unknowingly participating in a pervasive computing environment. People engage with not a single device for a specific purpose but many devices interacting with each other in the course of ordinary activity. With such prevalence of pervasive technology, the interaction between portable devices needs to be continuous and imperceptible to device users. Pervasive computing requires a small, scalable and robust network which relies heavily on the middleware to resolve communication and security issues. In this paper, we present the design and implementation of S-MARKS which incorporates device validation, resource discovery and a privacy module.