Trust establishment is hard in grid architecture by the ad hoc nature. To set up trust in large scale of network is more difficult. In this paper, we propose an automatic key manag...
Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhall...
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
The mobile phone industry has established a large customer base market, providing a wide range of mobile applications from voice and data services to digital media such as digital...
Wan Huzaini Wan Hussin, Reuben Edwards, Paul Coult...
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...