Two convincing paradigms have emerged for achieving scalability in widely distributed systems: publish/subscribe communication and role-based, policy-driven control of access to t...
Jean Bacon, David M. Eyers, Jatinder Singh, Peter ...
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only n...
Virgil D. Gligor, Himanshu Khurana, Radostina K. K...
The eXtensible Markup Language (XML) are being upheld as having the potential to change the way business is conducted. This will be effected by changing the way in which informati...
To reduce deployment and maintenance costs companies often decide to outsource parts of RFID infrastructure to an external application service provider. In scenarios where outsour...