Sciweavers

304 search results - page 14 / 61
» Trusted Computing in Mobile Action
Sort
View
MA
1998
Springer
167views Communications» more  MA 1998»
13 years 12 months ago
Reactive Tuple Spaces for Mobile Agent Coordination
Mobile active computational entities introduce peculiar problems in the coordination of distributed application components. The paper surveys several coordination models for mobil...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
DFMA
2005
IEEE
132views Multimedia» more  DFMA 2005»
14 years 1 months ago
Conditional Access in Mobile Systems: Securing the Application
This paper describes two protocols for the secure download of content protection software to mobile devices. The protocols apply concepts from trusted computing to demonstrate tha...
Eimear Gallery, Allan Tomlinson
CSREASAM
2008
13 years 9 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
ATAL
2008
Springer
13 years 9 months ago
Sequential decision making with untrustworthy service providers
In this paper, we deal with the sequential decision making problem of agents operating in computational economies, where there is uncertainty regarding the trustworthiness of serv...
W. T. Luke Teacy, Georgios Chalkiadakis, Alex Roge...
WISEC
2010
ACM
13 years 7 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig