Sciweavers

981 search results - page 40 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
WISE
2010
Springer
14 years 11 months ago
The Ubiquitous DBMS
Advancement in mobile computing technologies has prompted strong needs for database systems that can be used in small devices such as sensors, cellular phones, PDAs, car navigator...
Kyu-Young Whang
WETICE
2002
IEEE
15 years 6 months ago
Evaluation of a Publish/Subscribe System for Collaborative and Mobile Working
The MObile Teamwork Infrastructure for Organizations Networking (MOTION) 1 service platform that we have designed and implemented addresses an emerging requirement in the daily bu...
Pascal Fenkam, Engin Kirda, Schahram Dustdar, Hara...
PPPJ
2004
ACM
15 years 6 months ago
Embedding JAAS in agent roles to apply local security policies
Agents are an emerging technology that grants programmers a new way to exploit distributed resources. Roles are a powerful concept that can be used to model agent interactions, all...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
SAC
2002
ACM
15 years 1 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
IFIP
1998
Springer
15 years 5 months ago
Mobile agent technology in support of sales order processing in the virtual enterprise
The flexible integration of a range of disparate IT applications is a key requirement for today's global enterprises. The virtual enterprise, formed by a collection of collab...
Todd Papaioannou, John Edwards