Self-healing for autonomic pervasive computing
Proceedings of the 2007 ACM symposium on Applied computing
Wellness assistant: a virtual wellness assistant using pervasive computing
Proceedings of the 2007 ACM symposium on Applied computing
Service sharing with trust in pervasive environment: now it's time to break the jinx
Proceedings of the 2008 ACM symposium on Applied computing
A trust-based secure service discovery (TSSD) model for pervasive computing
Computer Communications
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications
Journal of Systems and Software
Avaliaçao de um serviço de gerenciamento de sessao para ambientes de medicina ubíqua
Proceedings of the 14th Brazilian Symposium on Multimedia and the Web
Journal of Systems and Software
Usability of mobile computing technologies to assist cancer patients
USAB'07 Proceedings of the 3rd Human-computer interaction and usability engineering of the Austrian computer society conference on HCI and usability for medicine and health care
Architecture and implementation of a trust model for pervasive applications
Journal of Mobile Multimedia
PryGuard: a secure distributed authentication protocol for pervasive computing environment
IEA/AIE'11 Proceedings of the 24th international conference on Industrial engineering and other applications of applied intelligent systems conference on Modern approaches in applied intelligence - Volume Part I
An embeddable fusion framework to manage context information in mobile devices
HAIS'10 Proceedings of the 5th international conference on Hybrid Artificial Intelligence Systems - Volume Part II
Hi-index | 0.00 |
With the tremendous increase in the use of mobile handheld and wearable devices, the pervasive computing arena is becoming stronger and powerful day by day. Despite having various physical constraints, many of the resourcerich functionalities enjoyed by other devices have been incorporated in these tiny devices. This is why different fields of research have developed in this area. There are still some unexplored but crucial features like Knowledge Usability, Resource Discovery, and Self-healing that deserve further attention. Besides exploration of these areas, implementation and evaluation of these features need to be considered from a security and privacy perspective. In this paper, we illustrate the design and implementation of a middleware MARKS, which incorporates these less-explored areas of pervasive computing, to guarantee optimum utilization of the physical capabilities and also to ensure security and privacy.