Sciweavers

981 search results - page 112 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
134
Voted
POPL
1999
ACM
15 years 5 months ago
Types for Mobile Ambients
An ambient is a named cluster of processes and subambients, which moves as a group. We describe type systems able to guarantee that certain ambients will remain immobile, and that ...
Luca Cardelli, Andrew D. Gordon
WMASH
2005
ACM
15 years 7 months ago
WilmaGate: a new open access gateway for hotspot management
Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...
Mauro Brunato, Danilo Severina
ESORICS
2006
Springer
15 years 5 months ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...
AGENTCL
2000
Springer
15 years 5 months ago
On Conversation Policies and the Need for Exceptions
The author describes a system for defining conversation policies that allows conversants to exchange explicit representations of how they use messages to get things done. This sy...
Scott A. Moore
SOSP
2003
ACM
15 years 10 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...