Conflict resolution of rules assigning values to virtual attributes
SIGMOD '89 Proceedings of the 1989 ACM SIGMOD international conference on Management of data
Programming perl
Modern database systems
Ubiquitous devices united: enabling distributed computing through mobile code
Proceedings of the 1999 ACM symposium on Applied computing
Anytime, anywhere: modal logics for mobile ambients
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Modeling Privacy Control in Context-Aware Systems
IEEE Pervasive Computing
FoSSaCS '98 Proceedings of the First International Conference on Foundations of Software Science and Computation Structure
Mobile Agent Security and Telescript
COMPCON '96 Proceedings of the 41st IEEE International Computer Conference
Agent Tcl: a flexible and secure mobile-agent system
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
Information exposure control through data manipulation for ubiquitous computing
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Efficient security policy enforcement for the mobile environment
Journal of Computer Security - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Efficient enforcement of security policies based on tracking of mobile users
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Modelling mobility aspects of security policies
CASSIS'04 Proceedings of the 2004 international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
Unified index for mobile object data and authorizations
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
A location-based policy-specification language for mobile devices
Pervasive and Mobile Computing
Hi-index | 0.00 |
A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobile agents are a promising new programming methodology for building distributed applications with many advantages over traditional client-server designs.We believe that properly controlled mobile agents provide a good foundation on which to build Sentient applications. The aims of this work are threefold: (i) to provide a simple location-based mechanism for the creation of security policies to control mobile agents; (ii) to simplify the task of producing applications for a pervasive computing environment through the constrained use of mobile agents; and (iii) to demonstrate the applicability of recent theoretical work using ambients to model mobility.