Sciweavers

388 search results - page 9 / 78
» Promoting the development of secure mobile agent application...
Sort
View
IUI
1998
ACM
13 years 11 months ago
EDEM: Intelligent Agents for Collecting Usage Data and Increasing User Involvement in Development
Expectation-Driven Event Monitoring (EDEM) provides developers with a platform for creating software agents to collect usage data and increase user involvement in the development ...
David M. Hilbert, Jason E. Robbins, David F. Redmi...
EDOC
2004
IEEE
13 years 11 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
24
Voted
SIGSOFT
2010
ACM
13 years 5 months ago
Software engineering issues for mobile application development
This paper provides an overview of important software engineering research issues related to the development of applications that run on mobile devices. Among the topics are devel...
Anthony I. Wasserman
SOCA
2007
IEEE
14 years 1 months ago
Mobile Agent and Web Service Integration Security Architecture
Mobile agent technology and Web Service technology compensate each other and play very important roles in eservice applications. The mechanism of Web Services technology naturally...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
FC
2008
Springer
134views Cryptology» more  FC 2008»
13 years 9 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate