منابع مشابه
Advances in pervasive computing: GUEST EDITORIAL
Acknowledgements There are many people who were involved in the effort to put this issue together. The Guest Editor would like to thank all the authors of the papers for their hard work and their contributions to the story of pervasive computing. He would also like to thank the many reviewers for their thoughtful and insightful comments and the time they spent reading papers. When the issue was...
متن کاملAdvances in pervasive health
Pervasive Health seeks to harness developments in pervasive computing technologies and harness them in the health domain. This domain may be interpreted in its widest possible sense, including the medical aspect both physical and mental, but also that of care management, education, community and occupational health. Such is the potential of pervasive computing technologies that the domain of pe...
متن کاملPervasive Java - IEEE Pervasive Computing
1536-1268/02/$17.00 © 2002 IEEE T oday, mobile devices and gadgets come with more than just a cool and cutting-edge design; they come equipped with small brains and a common language, making them smarter and more powerful than ever before. Perhaps they’re a little too smart—after all, they can adapt and morph into each other and become many-in-one super devices. Mobile phones with PDA capabilit...
متن کاملTrust in Pervasive Computing
Pervasive environments are comprised of resource-constrained mobile devices “limited” in their connectivity to other devices or networks due to the inherent dynamic nature of the environment. Limited connectivity to the Internet precludes the use of conventional security mechanisms like Certifying Authorities and other forms of server-centric authentication. Under these circumstances peer-to-pe...
متن کاملSecurity in Pervasive Computing
This article gives a brief look at the history of security in computing and a look at some of the existing security techniques. New threats introduced by pervasive computing are considered and security of existing link-layer protocols and applicability of higher-layer protocols is reviewed. Possible directions of the future of the security of pervasive computing are also considered.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Pervasive Computing and Communications
سال: 2009
ISSN: 1742-7371
DOI: 10.1108/17427370910950276