Sciweavers

1462 search results - page 40 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
DBKDA
2009
IEEE
238views Database» more  DBKDA 2009»
15 years 3 months ago
MyMIDP: An JDBC Driver for Accessing MySQL from Mobile Devices
Cell phones are no longer merely used to make phone calls or to send short or multimedia messages. They more and more become information systems clients. Recent developments in th...
Hagen Höpfner, Jörg Schad, Sebastian Wen...
FM
2008
Springer
130views Formal Methods» more  FM 2008»
15 years 1 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...
CASES
2005
ACM
15 years 1 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
WORDS
2002
IEEE
15 years 4 months ago
Role-Based Access Control for CORBA Distributed Object Systems
This paper shows how role-based access control (RBAC) models can be implemented in distributed object-based systems that follow OMG/CORBA standards. We introduce a novel approach ...
Rafael R. Obelheiro, Joni da Silva Fraga
TELECARE
2004
184views Healthcare» more  TELECARE 2004»
15 years 1 months ago
Securing Mobile Agent Based Tele-Assistance Systems
Nowadays the scientific community is trying to design new techniques in the search for solving security problems in mobile agent technology. There are now some industry initiatives...
Sergio Pozo, Rafael M. Gasca, María Teresa ...