Sciweavers

1462 search results - page 20 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
FAST
2003
13 years 8 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
PDPTA
2000
13 years 8 months ago
Design, Implementation, and Experimentation on Mobile Agent Security for Electronic Commerce Applications
In this paper, a Shopping Information Agent System (SIAS) is built based on mobile agent technology. It sends out agents to di erent hosts in an electronic marketplace. The agents ...
Anthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wo...
ESORICS
2007
Springer
14 years 28 days ago
What, Indeed, Is Intransitive Noninterference?
Abstract. This paper argues that Haigh and Young’s definition of noninterference for intransitive security policies admits information flows that are not in accordance with the...
Ron van der Meyden
MOBILITY
2009
ACM
13 years 11 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
FGR
2004
IEEE
97views Biometrics» more  FGR 2004»
13 years 10 months ago
Recognizing Song-Based Blink Patterns: Applications for Restricted and Universal Access
We introduce a novel system for recognizing patterns of eye blinks for use in assistive technology interfaces and security systems. First, we present a blink-based interface for c...
Tracy L. Westeyn, Thad Starner