Sciweavers

200 search results - page 21 / 40
» Replicating and Sharing Computer Security Laboratory Environ...
Sort
View
HUC
2009
Springer
15 years 2 months ago
Authenticating ubiquitous services: a study of wireless hotspot access
: © Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate HP Laborator...
Tim Kindberg, Chris Bevan, Eamonn O'Neill, James M...
CAISE
2000
Springer
15 years 1 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
SAG
2004
Springer
15 years 2 months ago
A Proxy Service for the xrootd Data Server
In data intensive sciences like High Energy Physics, large amounts of data are typically distributed and/or replicated to several sites. Although there exist various ways to store...
Andrew Hanushevsky, Heinz Stockinger
CIE
2007
Springer
14 years 9 months ago
Multimodal multiplayer tabletop gaming
There is a large disparity between the rich physical interfaces of co-located arcade games and the generic input devices seen in most home console systems. In this paper we argue ...
Edward Tse, Saul Greenberg, Chia Shen, Clifton For...
75
Voted
IEEEIAS
2008
IEEE
15 years 3 months ago
A Device Management Framework for Secure Ubiquitous Service Delivery
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume ...
Adrian Leung, Chris J. Mitchell