Sciweavers

106 search results - page 13 / 22
» Modelling Mobility Aspects of Security Policies
Sort
View
TWC
2010
13 years 2 months ago
Exploiting Mobility Diversity in Sharing Wireless Access: A Game Theoretic Approach
We propose a wireless access scheme which is based on a channel reservation sharing method for a group of mobile users. This proposed scheme exploits the mobility diversity of the ...
Dusit Niyato, Ping Wang, Ekram Hossain, Walid Saad...
CCS
2005
ACM
14 years 1 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
OOPSLA
2007
Springer
14 years 1 months ago
Democratizing the cloud
Programming distributed data-intensive web and mobile applications is gratuitously hard. As the world is moving more and more towards the software as services model, we have to co...
Erik Meijer
MEDES
2010
ACM
13 years 2 months ago
Negotiating and delegating obligations
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
Meriam Ben-Ghorbel-Talbi, Frédéric C...
EWSA
2004
Springer
14 years 26 days ago
An Architecture Description Language for Mobile Distributed Systems
Mobile software applications have to meet new requirements directly arising from mobility issues. To address these requirements at an early stage in development, an architecture d...
Volker Gruhn, Clemens Schäfer