Sciweavers

1462 search results - page 37 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
WETICE
1996
IEEE
15 years 4 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman
EAGC
2003
Springer
15 years 5 months ago
Mobile Work Environment for Grid Users
In the paper we aim to describe the project developing the Migrating Desktop infrastructure for the mobile users in a simple way. We also focus on the development testbed, which i...
Miroslaw Kupczyk, Rafal Lichwala, Norbert Meyer, B...
AICCSA
2005
IEEE
138views Hardware» more  AICCSA 2005»
15 years 5 months ago
Design, implementation and testing of mobile agent protection mechanism for MANETS
—In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depen...
K. E. A. Negm
AUSFORENSICS
2003
15 years 1 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
SPE
2002
115views more  SPE 2002»
14 years 11 months ago
D'Agents: Applications and performance of a mobile-agent system
D'Agents is a general-purpose mobile-agent system that has been used in several informationretrieval applications. In this paper, we first examine one such application, opera...
Robert S. Gray, George Cybenko, David Kotz, Ronald...