Sciweavers

106 search results - page 3 / 22
» Modelling Mobility Aspects of Security Policies
Sort
View
SSR
2001
104views more  SSR 2001»
13 years 7 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
MOBIMEDIA
2007
13 years 7 months ago
AAA and mobile networks: security aspects and architectural efficiency
Security is a crucial factor in the provision of the network services, in both wireless and wired communications. Day by day, the number of subscribers is increased by an exponent...
Nicolas Sklavos, Spyros G. Denazis, Odysseas G. Ko...
CIS
2004
Springer
13 years 11 months ago
A Scalable and Reliable Mobile Agent Computation Model
This paper presents a high performance service based mobile agent computation model. The scalability and reliability of this model is secured through the service clone policy and a...
Yong Liu, Congfu Xu, Zhaohui Wu, Yunhe Pan
CL
2002
Springer
13 years 6 months ago
Security boundaries in mobile ambients
A new notion of security boundary is introduced to model multilevel security policies in the scenario of mobile systems, within Cardelli and Gordon's "pure" mobile ...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
CN
2000
76views more  CN 2000»
13 years 6 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...