Secure collaboration in a mediator-free distributed environment
The Internet and related technologies have made multidomain collaborations a reality.
Collaboration enables domains to effectively share resources; however it introduces several …
Collaboration enables domains to effectively share resources; however it introduces several …
[PDF][PDF] Amuse: Autonomic management of ubiquitous e-health systems
Future e-Health systems will consist of low-power on-body wireless sensors attached to
mobile users that interact with a ubiquitous computing environment. This kind of system …
mobile users that interact with a ubiquitous computing environment. This kind of system …
Enhancing role-based trust management with a reputation system for MANETs
We start with role-based trust management (RBTM) and address some of the challenges
associated with using RBTM in mobile ad hoc networks (MANETs). We then enhance RBTM …
associated with using RBTM in mobile ad hoc networks (MANETs). We then enhance RBTM …
A role-based infrastructure for the management of dynamic communities
This paper defines an operational framework for specifying and establishing secure
collaborations between autonomous entities that need to interact and depend on each other …
collaborations between autonomous entities that need to interact and depend on each other …
Aspects of trusted and secure business-oriented vo management in service oriented architectures
Virtual enterprises or organisations (VO) have been the focus of research for over a decade.
Although proprietary implementations of VO management tools exist, secure tools based on …
Although proprietary implementations of VO management tools exist, secure tools based on …
A policy-based management architecture for mobile collaborative teams
E Asmare, A Gopalan, M Sloman… - 2009 IEEE …, 2009 - ieeexplore.ieee.org
Many missions are deemed dangerous or impractical to perform by humans, but can use
collaborating, self-managing unmanned autonomous vehicles (UAVs) which adapt their …
collaborating, self-managing unmanned autonomous vehicles (UAVs) which adapt their …
Trusted application-centric ad-hoc networks
Nodes in MANETs lack the protection offered by firewalls in infrastructure-based networks
because malicious nodes can roam into the vicinity of another node and start launching …
because malicious nodes can roam into the vicinity of another node and start launching …
Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad-hoc environment
Mobile ad-hoc network is a network that can dynamically setup on the fly by mobile nodes.
Due to its unique characteristics, it is becoming an attractive choice for commercial and also …
Due to its unique characteristics, it is becoming an attractive choice for commercial and also …
An efficient access control model for mobile ad-hoc communities
Mobile ad-hoc networks support interactions and collaborations among autonomous
devices by enabling users to share resources and provide services to each other, whether …
devices by enabling users to share resources and provide services to each other, whether …
Security protocols for mobile ad hoc networks
CR Davis - 2006 - escholarship.mcgill.ca
Mobile ad hoc networks (MANETs) are generating much interest both in academia and the
telecommunication industries. The principal attractions of MANETs are related to the ease …
telecommunication industries. The principal attractions of MANETs are related to the ease …