Sciweavers

35 search results - page 5 / 7
» Security boundaries in mobile ambients
Sort
View
IROS
2007
IEEE
108views Robotics» more  IROS 2007»
15 years 8 months ago
Hiding the acoustic signature of a mobile robot
—A mobile robot can be a rather significant source of noise: noisy fans cool onboard computers, motors are spinning, rubber wheels are squeaking against the floor, and mechanical...
Eric Martinson
ENTCS
2007
150views more  ENTCS 2007»
15 years 1 months ago
On the Expressiveness of Mobile Synchronizing Petri Nets
In recent papers we have introduced Mobile Synchronizing Petri Nets, a new model for mobility based on coloured Petri Nets. It allows the description of systems composed of a coll...
Fernando Rosa Velardo, David de Frutos-Escrig, Olg...
OTM
2004
Springer
15 years 7 months ago
Application of Grid Security to Personal Distributed Environments
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile...
Allan Tomlinson, Scarlet Schwiderski-Grosche
118
Voted
ICALP
2003
Springer
15 years 7 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
CORR
2006
Springer
97views Education» more  CORR 2006»
15 years 1 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt