Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...
Wireless and mobile networks represent an enabling technology for ubiquitous access to information systems. However, there are critical issues that still prevent the widespread us...
New challenging deployment scenarios are integrating mobile devices with limited and heterogeneous capabilities that roam among wireless access localities during service provisioni...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli