Enabling security for service discovery in pervasive computing environments
Nowadays, the digital world is witnessing the birth of a revolutionary computing paradigm that promises to have a profound effect on the way users interact with computers, devices, physical spaces, and other users. Pervasive or ubiquitous computing is a new technology introduced to computer science...
| Main Author: | Sharifi, Mahdi |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/10050/ http://eprints.utm.my/10050/1/MahdiSharifiMFSKSM2009.pdf |
Similar Items
Emerging sensor-cloud technology for pervasive services and applications
by: Hassan, Mohammad Mehedi, et al.
Published: (2014)
by: Hassan, Mohammad Mehedi, et al.
Published: (2014)
Service discovery in a dynamic office environment / Ooi Soo Teck
by: Ooi , Soo Teck
Published: (2007)
by: Ooi , Soo Teck
Published: (2007)
A Context-Aware Based Authorization
System For Pervasive Grid Computing
by: Lim , Marilyn Chien Hui
Published: (2015)
by: Lim , Marilyn Chien Hui
Published: (2015)
The Design of Flexible Pervasive Electronic Health Record (PEHR)
by: Abd Ghani, M. K., et al.
Published: (2011)
by: Abd Ghani, M. K., et al.
Published: (2011)
Semantic web services enabled CMS
by: Soh, Jien Min
Published: (2014)
by: Soh, Jien Min
Published: (2014)
The potential use of service-oriented infrastructure framework to enable transparent vertical scalability of cloud computing infrastructure
by: Muchtar, Farkhana, et al.
Published: (2018)
by: Muchtar, Farkhana, et al.
Published: (2018)
The potential use of service-oriented infrastructure framework to enable transparent vertical scalability of cloud computing infrastructure
by: Muchtar, Farkhana, et al.
Published: (2018)
by: Muchtar, Farkhana, et al.
Published: (2018)
A feature interaction conflicts detection engine for pervasive networked environment
by: Low, H. K., et al.
Published: (2007)
by: Low, H. K., et al.
Published: (2007)
Study on Security Testing-as-a-Service (TaaS) in Cloud Environment
by: Ponkoodalingan, Kannan, et al.
Published: (2018)
by: Ponkoodalingan, Kannan, et al.
Published: (2018)
Semantic web service adaptation model for a pervasive learning scenario
by: Lau, B-Y-S., et al.
Published: (2008)
by: Lau, B-Y-S., et al.
Published: (2008)
Pervasive car pooling system using push strategy
by: K.H., Yew, et al.
Published: (2008)
by: K.H., Yew, et al.
Published: (2008)
Skyline queries computation on crowdsourced-
enabled incomplete database
by: Swidan, Marwa, et al.
Published: (2020)
by: Swidan, Marwa, et al.
Published: (2020)
Rivisit grid computing security
by: Ismail, Saiful Adli, et al.
Published: (2008)
by: Ismail, Saiful Adli, et al.
Published: (2008)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Computational Discovery of Motifs Using Hierarchical Clustering Techniques
by: Wang, Dianhui, et al.
Published: (2008)
by: Wang, Dianhui, et al.
Published: (2008)
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments
by: Wietrzyk, Bartosz, et al.
Published: (2007)
by: Wietrzyk, Bartosz, et al.
Published: (2007)
Pervasive IOT: auto calibration in light sensor using embedded activity recognition
by: Neow, Zhi Chin
Published: (2021)
by: Neow, Zhi Chin
Published: (2021)
GOPE: A MVC driven mobile framework using HTML5 for pervasive device container
by: Lim, Tong Ming *, et al.
Published: (2013)
by: Lim, Tong Ming *, et al.
Published: (2013)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Enhancing security on IPv6 neighbor discovery using trust-ND.
by: Chong , Yung Wey
Published: (2017)
by: Chong , Yung Wey
Published: (2017)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Integrating security services into active network
by: Mandala, Satria
Published: (2005)
by: Mandala, Satria
Published: (2005)
Mobile and pervasive computing in construction: An introduction
by: Anumba, C., et al.
Published: (2012)
by: Anumba, C., et al.
Published: (2012)
Self-Organizing Grid Resource Discovery
by: Mahamat Issa , Hassan, et al.
Published: (2008)
by: Mahamat Issa , Hassan, et al.
Published: (2008)
Hybrid Hierarchical Approach For Addressing Service
Discovery Issues In MANETS.
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
A New Grid Resource Discovery Framework
by: Mahamat Issa, Hassan, et al.
Published: (2009)
by: Mahamat Issa, Hassan, et al.
Published: (2009)
A New Grid Resource Discovery Framework
by: Mahamat Issa, Hassan, et al.
by: Mahamat Issa, Hassan, et al.
Semantic-Based Scalable Decentralized Resource Discovery
by: Mahamat Issa , Hassan, et al.
Published: (2010)
by: Mahamat Issa , Hassan, et al.
Published: (2010)
Semantic-Based Grid Resource Discovery Systems
by: Mahamat Issa , Hassan, et al.
Published: (2010)
by: Mahamat Issa , Hassan, et al.
Published: (2010)
A New Grid Resource Discovery Framework
by: Hassan, Mahamat I., et al.
Published: (2011)
by: Hassan, Mahamat I., et al.
Published: (2011)
Computer security and ethics awareness among IIUM students: an empirical study
by: Aliyu, Mansur, et al.
Published: (2010)
by: Aliyu, Mansur, et al.
Published: (2010)
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025)
by: Islam, Md Shohidul
Published: (2025)
Computer security factors effects towards online usage of internet banking system
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2014)
Computer security factors effects towards online usage of internet banking system
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2015)
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2015)
Semantic-Based Scalable Decentralized Grid Resource Discovery
by: Mahamat Issa , Hassan, et al.
Published: (2009)
by: Mahamat Issa , Hassan, et al.
Published: (2009)
Scalable Self-Organizing Model for Grid Resource Discovery
by: Mahamat Issa, Hassan, et al.
Published: (2008)
by: Mahamat Issa, Hassan, et al.
Published: (2008)
Visualization pipeline for medical datasets on grid computing environment
by: Ahmed, A. A., et al.
Published: (2007)
by: Ahmed, A. A., et al.
Published: (2007)
Cloud Computing: Architecture for Efficient Provision of Services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Similar Items
-
Emerging sensor-cloud technology for pervasive services and applications
by: Hassan, Mohammad Mehedi, et al.
Published: (2014) -
Service discovery in a dynamic office environment / Ooi Soo Teck
by: Ooi , Soo Teck
Published: (2007) -
A Context-Aware Based Authorization
System For Pervasive Grid Computing
by: Lim , Marilyn Chien Hui
Published: (2015) -
The Design of Flexible Pervasive Electronic Health Record (PEHR)
by: Abd Ghani, M. K., et al.
Published: (2011) -
Semantic web services enabled CMS
by: Soh, Jien Min
Published: (2014)