Sciweavers

981 search results - page 67 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
ACSAC
2010
IEEE
14 years 11 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
109
Voted
DPD
2002
100views more  DPD 2002»
15 years 1 months ago
Light-Weight Currency Management Mechanisms in Mobile and Weakly-Connected Environments
This paper discusses the currency management mechanisms used in Deno, a replicated object storage system designed for use in mobile and weakly-connected environments. Deno primari...
Ugur Çetintemel, Peter J. Keleher
ISCC
2007
IEEE
104views Communications» more  ISCC 2007»
15 years 7 months ago
Chronicle Recognition for Mobility Management Triggers
An optimally working mobile system requires tight cooperation and an information stream that flows impeccably between its components. This, however, is not the current state of t...
Christophe Dousson, Kostas Pentikousis, Tiia Sutin...
PCI
2005
Springer
15 years 7 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
108
Voted
ATAL
2004
Springer
15 years 6 months ago
Risk Management Methods for Speculative Actions
In multiagent systems, a cooperative action requires a mutual agreement among multiple agents and the agreement is generally reached by exchanging messages between them, but the d...
Yasuhiko Kitamura, Takuya Murao