Sciweavers

105 search results - page 4 / 21
» Policy-based Authentication and Authorization: Secure Access...
Sort
View
GRID
2006
Springer
13 years 7 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...
GI
2003
Springer
14 years 25 days ago
Two-Factor Web Authentication Via Voice
: The increasing pressure for network accessible information and business applications demands secure, interoperable, cost efficient and user self-service authentication procedures...
Jörg Tacke, Andreas Wolf
ETFA
2005
IEEE
14 years 1 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
WMI
2001
147views more  WMI 2001»
13 years 9 months ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
SAC
2002
ACM
13 years 7 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...