Sciweavers

501 search results - page 9 / 101
» Access control and key management for mobile agents
Sort
View
IEEECIT
2010
IEEE
13 years 6 months ago
Research on Key Technologies of Building Home Control Based on the Wireless Network
: Relatively higher cost, worse extensibility of the monitoring points and weaker mobility are those disadvantages that widely exist in the wire data collection system of the tradi...
Si-You Xiao, Xuan Zhang
MOBICOM
1997
ACM
13 years 11 months ago
A Protection Scheme for Mobile Agents on Java
: This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities th...
Daniel Hagimont, Leila Ismail
FGCS
2007
90views more  FGCS 2007»
13 years 7 months ago
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing...
Xukai Zou, Yuan-Shun Dai, Xiang Ran
ACSAC
1999
IEEE
13 years 12 months ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
DRM
2003
Springer
14 years 25 days ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish