Sciweavers

621 search results - page 63 / 125
» Security of Internet Location Management
Sort
View
WMASH
2005
ACM
15 years 9 months ago
WilmaGate: a new open access gateway for hotspot management
Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...
Mauro Brunato, Danilo Severina
ESWS
2006
Springer
15 years 7 months ago
Semantic Web Policies - A Discussion of Requirements and Research Issues
Policies are pervasive in web applications. They play crucial roles in enhancing security, privacy and usability of distributed services. There has been extensive research in the a...
Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, ...
140
Voted
SPW
2001
Springer
15 years 8 months ago
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World
In the IPv6 world, the IP protocol itself, i.e., IPv6, is used for a number of functions that currently fall beyond the scope of the IPv4 protocol. These functions include address ...
Pekka Nikander
EGC
2005
Springer
15 years 9 months ago
M-Grid: Using Ubiquitous Web Technologies to Create a Computational Grid
Abstract. There are many potential users and uses for grid computing. However, the concept of sharing computing resources excites security concerns and, whilst being powerful and f...
Robert John Walters, Stephen Crouch
132
Voted
MMMACNS
2001
Springer
15 years 8 months ago
Analyzing Separation of Duties in Petri Net Workflows
Abstract. With the rise of global networks like the Internet the importance of workflow systems is growing. However, security questions in such environments often only address secu...
Konstantin Knorr, Harald Weidner