We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
The role of small devices in the emerging all-connected computer infrastructure is growing. So are the requirements that the application execution environments face. Portability, ...
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mobile agents are no longer a theoretical issue since different architectures for their realization have been proposed. With the increasing market of electronic commerce it become...
Hartmut Vogler, Thomas Kunkelmann, Marie-Luise Mos...
Abstract Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...