Sciweavers

761 search results - page 59 / 153
» Security Aspects of Mobile Communications
Sort
View
SACMAT
2010
ACM
13 years 7 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
IADIS
2004
13 years 10 months ago
A Context Aware User Profile for Personalization
With the emergence of the first 3G mobile technologies in everyday life, mobile phones and PDAs are able to function as more than just simple means of communication. Research on t...
D. Halvatzaras, M. Howard Williams
INFOCOM
2009
IEEE
14 years 3 months ago
Locally vs. Globally Optimized Flow-Based Content Distribution to Mobile Nodes
—The paper deals with efficient distribution of timely information to flows of mobile devices. We consider the case where a set of Information Dissemination Devices (IDDs) broa...
Mhameed Aezladen, Reuven Cohen, Danny Raz
JIT
2005
Springer
134views Database» more  JIT 2005»
14 years 2 months ago
MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing
: Access to Grid services is currently limited to devices having significant computing, network resources etc. such as desktop computers. On the other hand, most of mobile devices ...
Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo L...
WWW
2006
ACM
14 years 9 months ago
Safeguard against unicode attacks: generation and applications of UC-simlist
A severe potential security problem in utilization of Unicode in the Web is identified, which is resulted from the fact that there are many similar characters in the Unicode Chara...
Anthony Y. Fu, Wan Zhang, Xiaotie Deng, Liu Wenyin