Sciweavers

871 search results - page 142 / 175
» A Decentralized Authorization Architecture
Sort
View
NBIS
2007
Springer
15 years 3 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
AICT
2006
IEEE
100views Communications» more  AICT 2006»
15 years 3 months ago
A Concept Model for Computer-based Spoken Language Tests
Spoken language education plays an important role in modern language courses. Computer-based spoken language test systems provide a convenient, efficient and reliable approach to ...
Yijian Wu, Wenyun Zhao, Xin Peng, Yunjiao Xue
IEEEARES
2006
IEEE
15 years 3 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
IEEESCC
2006
IEEE
15 years 3 months ago
Secure and Provable Service Support for Human-Intensive Real-Estate Processes
This paper introduces SOAR, a service-oriented architecture for the real-estate industry that embeds trust and security, allows for formal correctness proofs of service interactio...
Emerson Ribeiro de Mello, Savas Parastatidis, Phil...
MOBIWAC
2006
ACM
15 years 3 months ago
Indoor tracking in WLAN location with TOA measurements
Authors presented recently an indoor location technique based on Time Of Arrival (TOA) obtained from Round-Trip-Time (RTT) measurements at data link level and trilateration. This ...
Marc Ciurana, Francisco Barceló, Sebastiano...