Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Mobile devices like PDAs or mobile phones have become widespread. Similarly, network functionality like GSM, Bluetooth, or WLAN has become standard. Nevertheless, not many applica...
Smartcards can be seen as service providing entities that implement a secure, tamper-proof storage and offer computational resources which make them ideally suited for a variety o...
In this paper we present the concept of ActivityCentric Collaboration Using Service-Oriented Architectures (ACCUSO), which addresses the requirements arising from ad-hoc collabora...
Daniel Schall, Robert Gombotz, Christoph Dorn, Sch...
Considering the advances of wireless, mobile and positioning technologies and the high requirement of the mobile marketing world for reaching as many customers as possible in a pe...
Angeliki Tsilira, Adamantia G. Pateli, Erast Athan...