Sciweavers

744 search results - page 86 / 149
» The Traust Authorization Service
Sort
View
ICDCSW
2003
IEEE
15 years 3 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
HICSS
2002
IEEE
98views Biometrics» more  HICSS 2002»
15 years 2 months ago
International Electronic Government Approaches
The most apparent proof of changes in the public sector because of modern information and communication technologies are electronic services like general onlineinformation procure...
Birgit J. Oberer
MOBICOM
2000
ACM
15 years 2 months ago
W-mail: an electronic mail system for wearable computing environments
This paper describes an e-mail system for wearable computing environments. In this system, we extend the conventional mail format and the server/client(browser) architecture by co...
Hirotaka Ueda, Masahiko Tsukamoto, Shojiro Nishio
DIGITALCITIES
2000
Springer
15 years 2 months ago
The Information Society in the City of Antwerp
In Antwerp the dream of an information highway became reality a long time ago. Antwerp has its electronic highway and every day it grows new side-roads and exits. The main aim is t...
Bruno Peeters
AGENTS
1998
Springer
15 years 2 months ago
Personal Security Agent: KQML-Based PKI
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Qi He, Katia P. Sycara, Timothy W. Finin