Sciweavers

722 search results - page 54 / 145
» Offering Mobile Security as a Service
Sort
View
DISCEX
2003
IEEE
15 years 3 months ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
ISCAPDCS
2004
14 years 11 months ago
Mobile Agent Data Integrity Using Multi-agent Architecture
Protection of agent data state and partial results in mobile agent systems continues to draw research interest. Current solutions to integrity attacks are geared at detection of m...
J. Todd McDonald, Alec Yasinsac, Willard C. Thomps...
SACMAT
2004
ACM
15 years 3 months ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
IEEEARES
2008
IEEE
15 years 4 months ago
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...
WISEC
2010
ACM
14 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig