Sciweavers

1462 search results - page 42 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
LICS
2003
IEEE
15 years 5 months ago
Logic in Access Control
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and ...
Martín Abadi
JUCS
2007
88views more  JUCS 2007»
14 years 11 months ago
Internet Payment System: A New Payment System for Internet Transactions
: Payment systems need to address a number of security issues in order to be an effective and secure means of transferring payments across the Internet. To be accessible to a wider...
Zoran Djuric, Ognjen Maric, Dragan Gasevic
ISICT
2003
15 years 1 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
EGOV
2004
Springer
15 years 5 months ago
M-GIS - Mobile and Interoperable Access to Geographic Information
This paper describes an architecture which can be used to access geographic information from mobile devices with limited display and processing characteristics, such as Personal Di...
Jorge Cardoso, Artur Rocha, João Correia Lo...
SOCA
2007
IEEE
15 years 6 months ago
Mobile Agent and Web Service Integration Security Architecture
Mobile agent technology and Web Service technology compensate each other and play very important roles in eservice applications. The mechanism of Web Services technology naturally...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan