The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Mobile agent technology and Web Service technology compensate each other and play very important roles in eservice applications. The mechanism of Web Services technology naturally...
Radio frequency identification (RFID), and more recently the development of Near Field Communication (NFC) technology, have popularized the idea of linking real-world products wit...
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...