Sciweavers

875 search results - page 39 / 175
» Requirements for Context-Dependent Mobile Access to Informat...
Sort
View
ADB
1994
311views Database» more  ADB 1994»
15 years 1 months ago
A Personal and Portable Database Server: the CQL Card
Database applications and technologies are of central importance in many information systems a person may encounter. To obtain services, the end-users are required a smart card (pl...
Pierre Paradinas, Jean-Jacques Vandewalle
DEXAW
2006
IEEE
138views Database» more  DEXAW 2006»
15 years 1 months ago
Lightweight Ontology-Based Service Discovery in Mobile Environments
The current ever-growing evolution of mobile technologies suggests the possibility of accessing services, in an itinerant and ubiquitous way, through many kinds of mobile devices ...
Devis Bianchini, Valeria De Antonellis, Michele Me...
101
Voted
ACSAC
1999
IEEE
15 years 2 months ago
Trustworthy Access Control with Untrustworthy Web Servers
If sensitive information is to be included in a shared web, access controls will be required. However, the complex software needed to provide a web service is prone to failure. To...
Tim Wilkinson, Dave Hearn, Simon R. Wiseman
ISICT
2003
14 years 11 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
MSWIM
2006
ACM
15 years 3 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda