a brief presentation on several approaches to managing security in pervasive computing environments.
Won\'t make any damn sense without my notes, which are: not attached
1. Bruce Sterling, When Blobjects Rule The Earth, SIGGRAPH, Los Angeles, 2004
retreived 18/08/08, from
http://www.viridiandesign.org/notes/401-450/00422_the_spime.html
2. So, how do you deal with privacy concerns in a
pervasive computing environment?
4. Virtual Walls: Protecting Digital Privacy in Pervasive
Environments
A. Kapadia, T. Henderson, J.J. Fielding David Kotz
Proceedings of the 5th International Conference on Pervasive Computing, number 4480 in LNCS, pages 162-
179, Toronto, Canada, May 2007. Springer-Verlag.