Sciweavers

6 search results - page 1 / 2
» Extending Security-by-Contract with Quantitative Trust on Mo...
Sort
View
CISIS
2010
IEEE
13 years 11 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
ISSA
2004
13 years 6 months ago
An Investigation Into Access Control For Mobile Devices
Mobile devices, such as mobile phones, are becoming multi-purpose devices. These devices are capable of storing data as well as running custom applications. As more people adopt t...
Stephen Perelson
SAC
2002
ACM
13 years 4 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
WWIC
2010
Springer
183views Communications» more  WWIC 2010»
13 years 9 months ago
Enhanced Mobility Support for Roaming Users: Extending the IEEE 802.21 Information Service
Many cell-phones and Personal Digital Assistants (PDAs) are equipped with multiple radio interfaces. Because of this, devices need to have ways of efficiently selecting the most su...
Karl Andersson, Andrea G. Forte, Henning Schulzrin...
GPC
2009
Springer
13 years 7 months ago
Balanced Scheduling Algorithm Considering Availability in Mobile Grid
The emerging Grid is extending the scope of resources to mobile devices and sensors that are connected through unreliable networks. Nowadays the number of mobile device users is in...
JongHyuk Lee, SungJin Song, JoonMin Gil, KwangSik ...