Sciweavers

1331 search results - page 58 / 267
» Trusted Mobile Platforms
Sort
View
ISSA
2004
13 years 9 months ago
An Investigation Into Access Control For Mobile Devices
Mobile devices, such as mobile phones, are becoming multi-purpose devices. These devices are capable of storing data as well as running custom applications. As more people adopt t...
Stephen Perelson
IFIP
2009
Springer
14 years 2 months ago
A Calculus of Trustworthy Ad Hoc Networks
We propose a process calculus for mobile ad hoc networks which embodies a behaviour-based multilevel decentralised trust model. Our trust model supports both direct trust, by monit...
Massimo Merro, Eleonora Sibilio
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
TRULLO - local trust bootstrapping for ubiquitous devices
—Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such cont...
Daniele Quercia, Stephen Hailes, Licia Capra
MA
1999
Springer
133views Communications» more  MA 1999»
13 years 12 months ago
Establishing a Secure Open-Environment for Using Mobile Agents in Electronic Commerce
Although mobile agents are a promising technology, the large-scale deployment of agents and the existence of hosts running agencies will not happen until proper security mechanism...
Paulo Marques, Luís Moura Silva, Joã...
DSOM
2000
Springer
14 years 7 hour ago
Evaluation of Constrained Mobility for Programmability in Network Management
In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobilit...
Christos Bohoris, Antonio Liotta, George Pavlou