The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Data on the file system in mobile internetworked working environments are exposed data to a number of threats ranging from physical theft of storage devices to industrial espiona...
Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. So far most of t...
The paradigm of mobile agents offers a powerful and flexible ity to develop distributed applications on a high-level of abstraction. One of the most interesting tasks for mobile ag...
Hartmut Vogler, Marie-Luise Moschgath, Thomas Kunk...