Sciweavers

1462 search results - page 47 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
WWW
2006
ACM
16 years 2 months ago
Designing an architecture for delivering mobile information services to the rural developing world
Paper plays a crucial role in many developing world information practices. However, paper-based records are inefficient, error-prone and difficult to aggregate. Therefore we need ...
Tapan S. Parikh, Edward D. Lazowska
112
Voted
EDOC
2004
IEEE
15 years 5 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
IANDC
2008
140views more  IANDC 2008»
15 years 1 months ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
132
Voted
EWSA
2004
Springer
15 years 7 months ago
An Architecture Description Language for Mobile Distributed Systems
Mobile software applications have to meet new requirements directly arising from mobility issues. To address these requirements at an early stage in development, an architecture d...
Volker Gruhn, Clemens Schäfer
117
Voted
MOBISYS
2007
ACM
16 years 1 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti