Sciweavers

266 search results - page 32 / 54
» Design of a Security Management Middleware in Ubiquitous Com...
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
14 years 17 days ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
DRM
2008
Springer
13 years 10 months ago
Enforcing DRM policies across applications
In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCONABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as a...
Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabrie...
CHI
2004
ACM
14 years 9 months ago
Context-sensitive design and human-centered interactive systems
Context is a critical element in forming the performance of interactive systems. As the functional diversity and range of use context of the system increase, context sensitivity b...
Keiichi Sato, Ken Douros
CCS
2004
ACM
14 years 2 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
MIDDLEWARE
2004
Springer
14 years 2 months ago
Architecture for resource allocation services supporting interactive remote desktop sessions in utility grids
Emerging large scale utility computing systems like Grids promise computing and storage to be provided to end users as a utility. System management services deployed in the middle...
Vanish Talwar, Bikash Agarwalla, Sujoy Basu, Raj K...