Sciweavers

304 search results - page 2 / 61
» Trusted Computing in Mobile Action
Sort
View
AINA
2007
IEEE
14 years 1 months ago
Mobile Agents and the Deus Ex Machina
This paper aims to examine the benefits the introduction of trusted computing can bring to the mobile agent paradigm, with a specific emphasis on mobile agent security.
Shane Balfe, Eimear Gallery
WOWMOM
2005
ACM
95views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Incremental Trust: Building Trust from Past Experience
Emerging ubiquitous computing leverages the need for automated trust management models. We take a domestic network of both fixed and mobile nodes as our reference scenario and in...
Marco Domenico Aime, Antonio Lioy
APWEB
2004
Springer
14 years 1 months ago
A Finite State Mobile Agent Computation Model
In this paper, a novel formalized finite state mobile agent computation model based on the virtual organization is presented. In this model, all the actions (e.g. service, migratio...
Yong Liu, Congfu Xu, Zhaohui Wu, Weidong Chen, Yun...
FOSAD
2007
Springer
14 years 1 months ago
Trusted Mobile Platforms
This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (inclu...
Eimear Gallery, Chris J. Mitchell
NBIS
2007
Springer
14 years 1 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim