Sciweavers

1757 search results - page 74 / 352
» Secure Content Validation
Sort
View
DRM
2003
Springer
15 years 8 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
ESAW
2003
Springer
15 years 8 months ago
A Liberal Approach to Openness in Societies of Agents.
We outline a model for a society of agents based upon one of the classical theories of sociology: The Weber’s model. We first investigate its links to agent technology through i...
Jacques Calmet, Anusch Daemi, Regine Endsuleit, Th...
107
Voted
WWW
2008
ACM
16 years 3 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
PERCOM
2008
ACM
16 years 2 months ago
MyNet: A Platform for Secure P2P Personal and Social Networking Services
Recent advances in peer-to-peer (P2P) technologies will enable users to establish ubiquitous connectivity among their personal networked devices and those of others. Building on t...
Dimitris N. Kalofonos, Zoe Antoniou, Franklin Reyn...
IAJIT
2010
133views more  IAJIT 2010»
15 years 1 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa