Sciweavers

160 search results - page 12 / 32
» Secure Information Flow in Mobile Bootstrapping Process
Sort
View
INFOCOM
2012
IEEE
13 years 7 months ago
Secure top-k query processing via untrusted location-based service providers
Abstract—This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosiv...
Rui Zhang 0007, Yanchao Zhang, Chi Zhang
171
Voted
ADHOCNOW
2004
Springer
15 years 10 months ago
Consensus with Unknown Participants or Fundamental Self-Organization
Abstract. We consider the problem of bootstrapping self-organized mobile ad hoc networks (MANET), i.e. reliably determining in a distributed and self-organized manner the services ...
David Cavin, Yoav Sasson, André Schiper
DBSEC
2011
245views Database» more  DBSEC 2011»
14 years 8 months ago
Multilevel Secure Data Stream Processing
Abstract. With sensors and mobile devices becoming ubiquitous, situation monitoring applications are becoming a reality. Data Stream Management Systems (DSMSs) have been proposed t...
Raman Adaikkalavan, Indrakshi Ray, Xing Xie
187
Voted
CIA
1998
Springer
15 years 9 months ago
Enhancing Mobile Agents with Electronic Commerce Capabilities
The paradigm of mobile agents offers a powerful and flexible ity to develop distributed applications on a high-level of abstraction. One of the most interesting tasks for mobile ag...
Hartmut Vogler, Marie-Luise Moschgath, Thomas Kunk...
SIGOPSE
1998
ACM
15 years 9 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau