Sciweavers

1988 search results - page 51 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
MOBISYS
2007
ACM
15 years 9 months ago
Context-for-wireless: context-sensitive energy-efficient wireless data transfer
Ubiquitous connectivity on mobile devices will enable numerous new applications in healthcare and multimedia. We set out to check how close we are towards ubiquitous connectivity ...
Ahmad Rahmati, Lin Zhong
GCC
2006
Springer
15 years 1 months ago
Developing the Modular Information Provider (MIP) to Support Interoperable Grid Information Services
The Modular Information Provider (MIP) has been developed to systematically aggregate multiple sources of information for Grid information services (GIS). MIP undertakes the chall...
Shaowen Wang, Eric Shook, Anand Padmanabhan, Ranso...
EDOC
2005
IEEE
15 years 3 months ago
Assessment of Enterprise Information Security - The Importance of Prioritization
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Erik Johansson, Pontus Johnson
ACSW
2003
14 years 11 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
ISW
2004
Springer
15 years 3 months ago
Universally Composable Secure Mobile Agent Computation
We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally co...
Ke Xu, Stephen R. Tate