Sciweavers

872 search results - page 104 / 175
» An Access Control Language for a General Provenance Model
Sort
View
EMSOFT
2011
Springer
12 years 7 months ago
Software certification: coding, code, and coders
We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. T...
Klaus Havelund, Gerard J. Holzmann
SACMAT
2004
ACM
14 years 1 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...
DRM
2008
Springer
13 years 9 months ago
Enforcing DRM policies across applications
In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCONABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as a...
Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabrie...
ATAL
2003
Springer
14 years 28 days ago
Communication for Goal Directed Agents
This paper discusses some modeling issues concerning the communication between goal-directed agents. In particular, the role of performatives in agent communication is discussed. I...
Mehdi Dastani, Jeroen van der Ham, Frank Dignum
JCC
2011
105views more  JCC 2011»
13 years 2 months ago
Wordom: A user-friendly program for the analysis of molecular structures, trajectories, and free energy surfaces
Abstract: Wordom is a versatile, user-friendly, and efficient program for manipulation and analysis of molecular structures and dynamics. The following new analysis modules have b...
Michele Seeber, Angelo Felline, Francesco Raimondi...