Sciweavers

981 search results - page 93 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
SACMAT
2004
ACM
15 years 7 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
PERCOM
2008
ACM
16 years 1 months ago
MyNet: A Platform for Secure P2P Personal and Social Networking Services
Recent advances in peer-to-peer (P2P) technologies will enable users to establish ubiquitous connectivity among their personal networked devices and those of others. Building on t...
Dimitris N. Kalofonos, Zoe Antoniou, Franklin Reyn...
ATAL
2008
Springer
15 years 3 months ago
Agent-community-network-based business matching and collaboration support system
Business matching and collaboration support systems are useful, in particular for small-and-medium companies. Most of them developed so far are based on the server-client architect...
Tsunenori Mine, Kosaku Kimura, Satoshi Amamiya, Ke...
CONEXT
2007
ACM
15 years 5 months ago
Enabling seamless internet mobility
Abstract--Mobility is a requirement not appropriately addressed by the original design of the Internet since an IP address has two fundamentally different tasks. It specifies a net...
Gregor Maier, Wolfgang Mühlbauer, Yevgen Rogo...
SAC
2008
ACM
15 years 1 months ago
Secure deletion for NAND flash file system
In most file systems, if a file is deleted, only the metadata of the file is deleted or modified and the file's data is still stored on the physical media. Some users require...
Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong...