Sciweavers

93 search results - page 5 / 19
» Matching Policies with Security Claims of Mobile Application...
Sort
View
ACSAC
2010
IEEE
14 years 7 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
CCS
2005
ACM
15 years 3 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
IPCCC
2006
IEEE
15 years 3 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin
MIDDLEWARE
2007
Springer
15 years 3 months ago
A Policy Management Framework for Content-Based Publish/Subscribe Middleware
Abstract. Content-based Publish/Subscribe (CPS) is a powerful paradigm providing loosely-coupled, event-driven messaging services. Although the general CPS model is well-known, man...
Alex Wun, Hans-Arno Jacobsen
SOUPS
2009
ACM
15 years 3 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe