Sciweavers

947 search results - page 24 / 190
» Information Security in Mobile Databases
Sort
View
133
Voted
IADIS
2003
15 years 4 months ago
A Multiagent Architecture for Information Retrieval in Distributed and Heterogeneous Data Sources
With the consolidation of the Internet and other computer networks, the need of sophisticated systems to retrieve information increased enormously. In these networks, information ...
Rafael T. de Sousa Jr., Alexandre C. V. de Oliveir...
124
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
144
Voted
ESORICS
2000
Springer
15 years 7 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
142
Voted
TKDE
2002
112views more  TKDE 2002»
15 years 3 months ago
Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems
Database systems for real-time applications must satisfy timing constraints associated with transactions. Typically, a timing constraint is expressed in the form of a deadline and ...
Chanjung Park, Seog Park, Sang Hyuk Son
114
Voted
ISW
2004
Springer
15 years 8 months ago
Re-thinking Security in IP Based Micro-Mobility
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes and middle-boxes, i.e. mobile anchor points. In this paper, we present a secure m...
Jukka Ylitalo, Jan Melén, Pekka Nikander, V...