Sciweavers

2061 search results - page 279 / 413
» Authorization for Metacomputing Applications
Sort
View
ATAL
2004
Springer
15 years 9 months ago
Normative Agent Reasoning in Dynamic Societies
Several innovative software applications such as those required by ambient intelligence, the semantic grid, e-commerce and e-marketing, can be viewed as open societies of heteroge...
Fabiola López y López, Michael Luck,...
ISI
2004
Springer
15 years 9 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
JELIA
2004
Springer
15 years 9 months ago
Hierarchical Decision Making by Autonomous Agents
Abstract. Often, decision making involves autonomous agents that are structured in a complex hierarchy, representing e.g. authority. Typically the agents share the same body of kno...
Stijn Heymans, Davy Van Nieuwenborgh, Dirk Vermeir
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
15 years 9 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong
SEMWEB
2004
Springer
15 years 9 months ago
Metadata-Driven Personal Knowledge Publishing
We propose a personal knowledge publishing system called Semblog is realized with integration of Semantic Web techniques and Weblog tools. Semblog suite provides an integrated envi...
Ikki Ohmukai, Hideaki Takeda, Masahiro Hamasaki, K...