Sciweavers

754 search results - page 71 / 151
» Can self-managed systems be trusted
Sort
View
DALT
2010
Springer
13 years 5 months ago
Understanding Permissions through Graphical Norms
Abstract. Norm-aware agents are able to reason about the obligations, permissions and prohibitions that affect their operation. While much work has focused on the creation of such ...
Nir Oren, Madalina Croitoru, Simon Miles, Michael ...
KESAMSTA
2010
Springer
14 years 5 days ago
Modelling Dynamic Forgetting in Distributed Information Systems
Abstract. We describe and model a new aspect in the design of distributed information systems. We build upon a previously described problem on the microlevel, which asks how quickl...
Nicolas Höning, Martijn C. Schut
JUCS
2010
143views more  JUCS 2010»
13 years 8 months ago
Information Support Services for Intermediation Tasks of Collaborative Networks
: Companies in collaborative networks require intermediation to perform. The collaborative network forms the breeding environment for the configuration of a Virtual Enterprise that...
Heiko Thimm, Karsten Boye Rasmussen
ESORICS
2009
Springer
14 years 10 months ago
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
Abstract. As the number and scope of government regulations and rules mandating trustworthy retention of data keep growing, businesses today are facing a higher degree of regulatio...
Tiancheng Li, Xiaonan Ma, Ninghui Li
SUTC
2008
IEEE
14 years 4 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu