Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
The most apparent proof of changes in the public sector because of modern information and communication technologies are electronic services like general onlineinformation procure...
This paper describes an e-mail system for wearable computing environments. In this system, we extend the conventional mail format and the server/client(browser) architecture by co...
In Antwerp the dream of an information highway became reality a long time ago. Antwerp has its electronic highway and every day it grows new side-roads and exits. The main aim is t...
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...