Sciweavers

106 search results - page 5 / 22
» Modelling Mobility Aspects of Security Policies
Sort
View
JCS
2010
124views more  JCS 2010»
13 years 6 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
ICPPW
2003
IEEE
14 years 23 days ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
NBIS
2007
Springer
14 years 1 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
AOSD
2010
ACM
14 years 24 days ago
A permission system for secure AOP
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of ...
Wouter De Borger, Bart De Win, Bert Lagaisse, Wout...
ESORICS
1998
Springer
13 years 11 months ago
Rules for Designing Multilevel Object-Oriented Databases
When implementing a multilevel security policy for Object-Oriented Databases (OODBs), several aspects have to be investigated. One of these aspect is the design of multilevel OODB...
Frédéric Cuppens, Alban Gabillon