International audienceChip-Secured XML Access (C-SXA) is a versatile XML-based Access Right Controller embedded in a smart card. C-SXA can be used either to protect the privacy of on-board personal data or to control the flow of data extracted from an external source. C-SXA addresses a broad range of applications, like secure portable folders, Digital Right Management, parental control or exchange of confidential information among a community of users. We illustrate the effectiveness of this technology through a collaborative agenda application embedded in a cellular phone SIM card
Smart devices capture users' activity such as unlock failures, application usage, location and proxi...
Abstract Identity management is defined as the set of processes related to identity and access infor...
Web services via wireless technologies, mobile services (M-services), HTTP, and XML have become impo...
IJCSSE, Special Issue on Mobile DatabasesInternational audienceChip-Secured XML Access (C-SXA) is a ...
Abstract: Chip-Secured XML Access (C-SXA) is a versatile and tamper-resistant XML-based Access Right...
There is a huge prevalence of mobile devices being connected to the Internet because of high demands...
Abstract:- Companies across the world are turning to mobile commerce because mobility brings competi...
The CASTING project is concerned with the application of smart card technology in combination with s...
Access control techniques for XML provide a simple way to protect confidential information at the sa...
Abstract. In this paper, we present a novel fine-grained access control system for applications wher...
Abstract—In the modern health service, data are accessed by doctors and nurses using mobile, Persona...
More and more information is distributed in XML format, both on corporate Intranets and on the globa...
The erosion of trust put in traditional database servers and in Database Service Providers and the g...
在本篇論文中,我們以iOS裝置為運行平台設計並實作了一個用於XML數位簽章的行動裝置之XML安全應用程序介面。此應用程序介面遵照W3C標準XML Signature Syntax and Proces...
The erosion of trust put in traditional database servers and in Database Service Providers and the g...
Smart devices capture users' activity such as unlock failures, application usage, location and proxi...
Abstract Identity management is defined as the set of processes related to identity and access infor...
Web services via wireless technologies, mobile services (M-services), HTTP, and XML have become impo...
IJCSSE, Special Issue on Mobile DatabasesInternational audienceChip-Secured XML Access (C-SXA) is a ...
Abstract: Chip-Secured XML Access (C-SXA) is a versatile and tamper-resistant XML-based Access Right...
There is a huge prevalence of mobile devices being connected to the Internet because of high demands...
Abstract:- Companies across the world are turning to mobile commerce because mobility brings competi...
The CASTING project is concerned with the application of smart card technology in combination with s...
Access control techniques for XML provide a simple way to protect confidential information at the sa...
Abstract. In this paper, we present a novel fine-grained access control system for applications wher...
Abstract—In the modern health service, data are accessed by doctors and nurses using mobile, Persona...
More and more information is distributed in XML format, both on corporate Intranets and on the globa...
The erosion of trust put in traditional database servers and in Database Service Providers and the g...
在本篇論文中,我們以iOS裝置為運行平台設計並實作了一個用於XML數位簽章的行動裝置之XML安全應用程序介面。此應用程序介面遵照W3C標準XML Signature Syntax and Proces...
The erosion of trust put in traditional database servers and in Database Service Providers and the g...
Smart devices capture users' activity such as unlock failures, application usage, location and proxi...
Abstract Identity management is defined as the set of processes related to identity and access infor...
Web services via wireless technologies, mobile services (M-services), HTTP, and XML have become impo...