Sciweavers

219 search results - page 30 / 44
» Types for Access Control in a Calculus of Mobile Resources
Sort
View
ISM
2005
IEEE
169views Multimedia» more  ISM 2005»
14 years 1 months ago
A Framework to Improve QoS and Mobility Management for Multimedia Applications in the IMS
The new IP Multimedia Subsystem (IMS) provides an overlay architecture for IP based core networks and enables the efficient provision of an open set of potentially highly integrat...
Fabricio Carvalho de Gouveia, Thomas Magedanz
ESORICS
2000
Springer
13 years 11 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
GEOINFO
2003
13 years 9 months ago
The Architecture of a Mobile Emergency Plan Deployment System
This paper describes the implementation of a workflow management system to support mobile GIS workgroup applications and highlights the design of the workflow definition language t...
Fábio Meira de Oliveira Dias, Marcelo T&iac...
ANSS
2006
IEEE
14 years 1 months ago
Performance Modeling and Evaluation of E-Business Systems
A general model of an E-business system comprising an Application Server and a Database engine is analyzed and evaluated. Incoming jobs, once admitted for processing, compete for ...
Giovanna Ferrari, Paul D. Ezhilchelvan, Isi Mitran...
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 7 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang