Sciweavers

722 search results - page 45 / 145
» Offering Mobile Security as a Service
Sort
View
MOBIDE
2005
ACM
14 years 4 months ago
Video-streaming for fast moving users in 3G mobile networks
The emergence of third-generation (3G) mobile networks offers new opportunities for the effective delivery of data with rich content including multimedia messaging and video-strea...
Anna Kyriakidou, Nikos Karelos, Alex Delis
OOPSLA
2001
Springer
14 years 3 months ago
Portable Resource Control in Java: The J-SEAL2 Approach
Preventing abusive resource consumption is indispensable for all kinds of systems that execute untrusted mobile code, such as mobile object systems, extensible web servers, and we...
Walter Binder, Jarle Hulaas, Alex Villazón
CHI
2008
ACM
14 years 11 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
ACSAC
2000
IEEE
14 years 3 months ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer
SP
2002
IEEE
122views Security Privacy» more  SP 2002»
13 years 10 months ago
The UNICORE Grid infrastructure
UNICORE (Uniform Interface to Computer Resources) is a software infrastructure supporting seamless and secure access to distributed resources. UNICORE allows uniform access to dif...
Mathilde Romberg