We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
In this paper, we are going to show how to build up agentoriented Public Key Infrastructure(PKI) from SPKI/SDSI and X.509 standards. A variety of delegation mechanisms for agents ...
As wireless networks have been widely deployed for public mobile services, predicting the location of a mobile user in wireless networks became an interesting and challenging prob...
Bandwidth consumption in distributed real-time simulation, or networked real-time simulation, is a major problem as the number of participants and the sophistication of joint simu...
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, that enable context-aware and privacy-conscious user data sharing appropr...
Richard Hull, Bharat Kumar, Daniel F. Lieuwen, Pet...