Sciweavers

1462 search results - page 10 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
CIA
1998
Springer
13 years 11 months ago
Enhancing Mobile Agents with Electronic Commerce Capabilities
The paradigm of mobile agents offers a powerful and flexible ity to develop distributed applications on a high-level of abstraction. One of the most interesting tasks for mobile ag...
Hartmut Vogler, Marie-Luise Moschgath, Thomas Kunk...
IEEEIAS
2009
IEEE
14 years 1 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang
ISMIS
2005
Springer
14 years 6 days ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
ICDCS
1998
IEEE
13 years 11 months ago
NFS/M: An Open Platform Mobile File System
With the advancement of wireless network and mobile computing, there is an increasing need to build a mobile le system that can perform e ciently and correctly for accessing onlin...
John C. S. Lui, Oldfield K. Y. So, T. S. Tam
DEXAW
2000
IEEE
149views Database» more  DEXAW 2000»
13 years 10 months ago
A Flexible Mobile-Agent Framework for Accessing Information Systems in Disconnected Computing Environments
Over the last few years, the importance of mobile computing as been steadily increasing. While it is important to provide support for accessing databases in disconnected computing...
Paulo Marques, Luís Moura Silva, Joã...