Topics: Software Architecture
This presentation introduces the architecture and features of tactical cloudlets and presents a solution for establishing trusted identities in disconnected environments based on the generation and exchange of secure keys in the field.
he goal of this paper is to present a solution for establishing trusted identities in disconnected environments based on secure key generation and exchange in the field.
Topics: Pervasive Mobile Computing
This report presents an architecture and experimental results that demonstrate that cyber-foraging using tactical cloudlets increases the survivability of mobile systems.
This presentation explains the tactical cloudlet concept and describes an implementation targeted at promoting the survivability of mobile systems.