1 - 7 of 7 articles
Purpose – This paper aims to analyze the security issues that arise when integrating wireless sensor networks (WSN) and the internet. Also, it seeks to review whether existing technology mechanisms are suitable and can be applied in this context. Design/methodology/approach – The paper considers...
Purpose – This paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research. Design/methodology/approach – The paper analyses the privacy implications of particular characteristics of ubiquitous...
Purpose – The authors seek to propose the notion of ubiquitous proximity e‐service for exploring collective wisdom in the ubiquitous environment. Ubiquitous proximity e‐service highlights the collective effort focused on collecting the user group's power as the reference for ubiquitous trust...
Purpose – The purpose of this paper is to identify security technologies that are essential in making home network systems secure and to describe specialized security mechanisms for the home network and the relationships among them. Design/methodology/approach – The research model is designed to...
Purpose – This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. The authors introduce the concept of the obligation of trust (OoT) protocol as a privacy assurance and authorization mechanism that is...
Purpose – As large‐scale homogeneous networks suffer from high costs of communication, computation, and storage requirements, the heterogeneous sensor networks (HSN) are preferred because they provide better performance and security solutions for scalable applications in dynamic environments....
Purpose – This paper seeks to develop an approach to problem localization and an algorithm to address the issue of determining the dependencies among system metrics for automated system management in ubiquitous computing systems. Design/methodology/approach – This paper proposes an approach to...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Sign up with Google
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.