Sciweavers

157 search results - page 21 / 32
» Mobility Management with Distributed AAA Architecture
Sort
View
CCS
2009
ACM
15 years 6 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
95
Voted
DIM
2005
ACM
15 years 1 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
114
Voted
EAGC
2003
Springer
15 years 4 months ago
Mobile Work Environment for Grid Users
In the paper we aim to describe the project developing the Migrating Desktop infrastructure for the mobile users in a simple way. We also focus on the development testbed, which i...
Miroslaw Kupczyk, Rafal Lichwala, Norbert Meyer, B...
AMKM
2003
Springer
15 years 4 months ago
Integrating External Sources in a Corporate Semantic Web Managed by a Multi-agent System
We first describe a multi-agent system managing a corporate memory in the form of a corporate semantic web. We then focus on a newly introduced society of agents in charge of wrap...
Tuan-Dung Cao, Fabien Gandon
SAC
2004
ACM
15 years 5 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...