Sciweavers

41 search results - page 3 / 9
» Security Policy Management for Handheld Devices
Sort
View
ACSAC
2004
IEEE
13 years 9 months ago
PEACE: A Policy-Based Establishment of Ad-hoc Communities
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
Sye Loong Keoh, Emil Lupu, Morris Sloman
MOBISYS
2006
ACM
14 years 4 months ago
CoolSpots: reducing the power consumption of wireless mobile devices with multiple radio interfaces
CoolSpots enable a wireless mobile device to automatically switch between multiple radio interfaces, such as WiFi and Bluetooth, in order to increase battery lifetime. The main co...
Trevor Pering, Yuvraj Agarwal, Rajesh K. Gupta, Ro...
CISIS
2010
IEEE
14 years 6 days ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
WPES
2004
ACM
13 years 10 months ago
Privacy management for portable recording devices
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privac...
J. Alex Halderman, Brent R. Waters, Edward W. Felt...
NSPW
2004
ACM
13 years 10 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...