Sciweavers

148 search results - page 29 / 30
» Implementing identity provider on mobile phone
Sort
View
TRUST
2010
Springer
13 years 10 months ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
SACMAT
2009
ACM
14 years 8 days ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
HUC
2011
Springer
12 years 5 months ago
How smart is your smartcard?: measuring travel behaviours, perceptions, and incentives
The widespread adoption of automated fare collection (AFC) systems by public transport authorities around the world means that, increasingly, people carry and use passive sensors ...
Neal Lathia, Licia Capra
MOBISYS
2008
ACM
14 years 5 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
ADB
1994
311views Database» more  ADB 1994»
13 years 10 months ago
A Personal and Portable Database Server: the CQL Card
Database applications and technologies are of central importance in many information systems a person may encounter. To obtain services, the end-users are required a smart card (pl...
Pierre Paradinas, Jean-Jacques Vandewalle