Sciweavers

592 search results - page 90 / 119
» Competition, Cooperation, and Authorization
Sort
View
FTDCS
1997
IEEE
14 years 1 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
ECOOPW
1998
Springer
14 years 1 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
GROUP
2007
ACM
14 years 26 days ago
Knowledge work artifacts: kernel cousins for free/open source software development
Most empirical studies of peer production have focused on the final products of these efforts (such as software in Free/Open Source projects), but there are also many other knowle...
Margaret S. Elliott, Mark S. Ackerman, Walt Scacch...
CHI
2010
ACM
13 years 11 months ago
Doctors and psychosocial information: records and reuse in inpatient care
We conducted a field-based study at a large teaching hospital to examine doctors' use and documentation of patient care information, with a special focus on a patient's ...
Xiaomu Zhou, Mark S. Ackerman, Kai Zheng
DLOG
2008
13 years 11 months ago
Identifying Objects Over Time with Description Logics
A fundamental requirement for cooperating agents is to agree on a selection of component values of objects that can be used for reliably communicating references to the objects, to...
David Toman, Grant E. Weddell