Sciweavers

1449 search results - page 201 / 290
» Secure and Efficient Metering
Sort
View
ISI
2004
Springer
14 years 4 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
ISCC
2003
IEEE
138views Communications» more  ISCC 2003»
14 years 4 months ago
Authenticated Access for IPv6 Supported Mobility
Hierarchical Mobile IPv6 (HMIPv6) is a protocol that enhances Mobile IPv6 (MIPv6) with faster handovers. Neither HMIPv6 nor MIPv6 provides ways to authenticate roaming mobile node...
Paal Engelstad, Thomas Haslestad, Fréd&eacu...
COMPSAC
2009
IEEE
14 years 3 months ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...
AGENTS
2001
Springer
14 years 3 months ago
Every agent a web server, every agent community an intranet..
The research community is struggling with the right approach to integrate emerging agent technology with the exploding web page-based Internet. This paper presents the approach us...
Marshall Brinn, Todd M. Carrico, Nathan Combs
SAC
2000
ACM
14 years 3 months ago
A Mobile Agent Infrastructure for the Mobility Support
The mobility of terminals and users is a crucial issue in the open global system represented by the Internet. Supporting terminal and user mobility requires a middleware infrastru...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...