Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Using speakeasy for ad hoc peer-to-peer collaboration
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Secure Peer-to-Peer Networking: The JXTA Example
IT Professional
PKI: It's Not Dead, Just Resting
Computer
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Spontaneous networking: an application oriented approach to ad hoc networking
IEEE Communications Magazine
Enclaves: enabling secure collaboration over the Internet
IEEE Journal on Selected Areas in Communications
A Wireless Web for Creating and Sharing Personal Content through Handsets
IEEE Pervasive Computing
A SOA for ubiquitous communication management
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Hi-index | 0.00 |
Intel recently conducted an experiment focusing on local identity management. Developers created an application that ran on desktops, laptops, and PDAs in which groups of people could securely share documents, text messages, and other electronic media. This application's heart is Relationship Management, a middleware component that supports ad hoc persistent group formation, end-to-end security, and client-based identity management with network independence.