Sciweavers

2808 search results - page 491 / 562
» Mobile Agent Security
Sort
View
SAINT
2007
IEEE
14 years 4 months ago
Privacy Management for Context Transponders
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner
ICCS
2007
Springer
14 years 4 months ago
A Privacy-Aware Identity Design for Exploring Ubiquitous Collaborative Wisdom
Privacy and security has been considered as the top criterion for the acceptance of e-service adoption. In this paper, we proposed a privacy aware identity protection design that i...
Yuanchu Hwang, Soe-Tsyr Yuan
ACSC
2005
IEEE
14 years 3 months ago
SuperstringRep: Reputation-enhanced Service Discovery
1 Service discovery protocols are used in distributed systems to locate services for clients. The services that are located as well as the clients requesting service are commonly a...
Ryan Wishart, Ricky Robinson, Jadwiga Indulska
CW
2005
IEEE
14 years 3 months ago
A Capability-Based Transparent Cryptographic File System
Data on the file system in mobile internetworked working environments are exposed data to a number of threats ranging from physical theft of storage devices to industrial espiona...
Frank Graf, Stephen D. Wolthusen
BIRTHDAY
2003
Springer
14 years 3 months ago
A Formal Basis for Reasoning on Programmable QoS
Abstract. The explicit management of Quality of Service (QoS) of network connectivity, such as, e.g., working cost, transaction support, and security, is a key requirement for the ...
Rocco De Nicola, Gian Luigi Ferrari, Ugo Montanari...