Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
– The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and ch...
Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In in...
– Allowing a user to remain connected to the network whilst on the move is becoming a common requirement for any new communication system. The EU project Ambient Networks, theref...
Ramon Aguero Calvo, Abigail Surtees, Jochen Eisl, ...