Sciweavers

2358 search results - page 90 / 472
» A Secure Pervasive Environment
Sort
View
SAC
2002
ACM
13 years 8 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
ACSAC
2001
IEEE
14 years 18 days ago
Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce
The perceived lack of security in the wireless environment has delayed many initiatives in providing access to ecommerce applications from wireless devices. Many organizations are...
Paul Ashley, Heather M. Hinton, Mark Vandenwauver
ICISC
2007
105views Cryptology» more  ICISC 2007»
13 years 10 months ago
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments
Establishing interoperability is the first and foremost problem of secure interoperation in multi-domain environments. In this paper, we propose a framework to facilitate the esta...
Jinwei Hu, Ruixuan Li, Zhengding Lu
WETICE
1997
IEEE
14 years 1 months ago
Providing Secure Environments for Untrusted Network Applications
: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
Qun Zhong
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 9 months ago
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabil...
Mohsen Toorani