Sciweavers

501 search results - page 37 / 101
» Access control and key management for mobile agents
Sort
View
AMKM
2003
Springer
14 years 27 days ago
Agentized, Contextualized Filters for Information Management
Every time a user engaged in work reads or writes, the user spontaneously generates new information needs: to understand the text he or she is reading or to supply more substance ...
David A. Evans, Gregory Grefenstette, Yan Qu, Jame...
AINA
2004
IEEE
13 years 11 months ago
Secret Sharing with Access Structures in a Hierarchy
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access structures in a hierarchy. They used the concept of discrete logarithmto reuse shado...
Chin-Chen Chang, Chu-Hsing Lin, Wei Lee, Pai-Cheng...
JUCS
2010
98views more  JUCS 2010»
13 years 6 months ago
Mobile Agent-based Context-aware Services
: This paper presents an agent-based system for building and operating agent-based context-aware services in public spaces, including museums. The system provides users with agents...
Ichiro Satoh
IMECS
2007
13 years 9 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
ACMSE
2006
ACM
14 years 1 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin