Sciweavers

981 search results - page 16 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
ASIACRYPT
2000
Springer
15 years 4 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas
SAC
2000
ACM
15 years 4 months ago
A Mobile Agent Infrastructure for the Mobility Support
The mobility of terminals and users is a crucial issue in the open global system represented by the Internet. Supporting terminal and user mobility requires a middleware infrastru...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
MAS
1998
Springer
145views Communications» more  MAS 1998»
15 years 3 months ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith
FC
2008
Springer
134views Cryptology» more  FC 2008»
15 years 1 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
COOPIS
1995
IEEE
15 years 3 months ago
From Organization Models to System Requirements: A 'Cooperating Agents' Approach
Increasingly, information systems development occurs in the context of existing systems and established organizational processes. Viewing organizational and system components as c...
Eric S. K. Yu, Philippe Du Bois, Eric Dubois, John...