Sciweavers

501 search results - page 66 / 101
» Access control and key management for mobile agents
Sort
View
SACMAT
2009
ACM
14 years 1 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
HICSS
2003
IEEE
136views Biometrics» more  HICSS 2003»
14 years 2 months ago
Dynamic Network Interface Selection in Multihomed Mobile Hosts
Abstract—Current mobile devices are often equipped with several network interfaces, which may be of different access technologies, both wireless and cellular. Different requireme...
Jukka Ylitalo, Tony Jokikyyny, Tero Kauppinen, Ant...
GLOBECOM
2009
IEEE
14 years 2 days ago
Inter-Gateway Cross-Layer Handoffs in Wireless Mesh Networks
—Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-s...
Weiyi Zhao, Jiang Xie
OTM
2007
Springer
14 years 3 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
IPPS
2003
IEEE
14 years 2 months ago
A Novel Design Technology for Next Generation Ubiquitous Computing Architecture
Modern applications for mobile computing require high performance architectures. On the other hand, there are restrictions such as storage or power consumption. The use of reconï¬...
Carsten Nitsch, Camillo Lara, Udo Kebschull