Sciweavers

501 search results - page 75 / 101
» Access control and key management for mobile agents
Sort
View
AXMEDIS
2006
IEEE
215views Multimedia» more  AXMEDIS 2006»
14 years 2 months ago
Distributed Architectures for High Performance and Privacy-Aware Content Generation and Delivery
The increasing heterogeneity of mobile client devices used to access the Web requires run-time adaptations of the Web contents. A significant trend in these content adaptation se...
Claudia Canali, Michele Colajanni, Riccardo Lancel...
POPL
2000
ACM
14 years 1 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
AAAI
1990
13 years 10 months ago
The Intelligent Database Interface: Integrating AI and Database Systems
The Intelligent Database Interface (IDI) is a cache-based interface that is designed to provide Artificial Intelligence systems with efficient access to one or more databases on o...
Donald P. McKay, Timothy W. Finin, Anthony B. O'Ha...
DIM
2009
ACM
14 years 3 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
DALT
2004
Springer
14 years 2 months ago
A Protocol for Resource Sharing in Norm-Governed Ad Hoc Networks
Ad hoc networks may be viewed as computational systems whose members may fail to, or choose not to, comply with the rules governing their behaviour. We are investigating to what ex...
Alexander Artikis, Lloyd Kamara, Jeremy Pitt, Mare...