Advancement in wireless infrastructure for data access through third generation wireless and wi-fi technologies makes it possible to use mobile devices for various activities and ...
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally co...
As in any other organization, hospital personnel absorb information from their environment, turn it into knowledge, and then make decisions based on it. Hospital Information System...
Mobile phones are becoming a primary platform for information access and when coupled with recommender systems technologies they can become key tools for mobile users both for lei...