Sciweavers

5324 search results - page 882 / 1065
» Internet Security Protocols
Sort
View
AGENTS
2001
Springer
14 years 1 months ago
Every agent a web server, every agent community an intranet..
The research community is struggling with the right approach to integrate emerging agent technology with the exploding web page-based Internet. This paper presents the approach us...
Marshall Brinn, Todd M. Carrico, Nathan Combs
AGENTS
2001
Springer
14 years 1 months ago
Automated negotiation from declarative contract descriptions
We present and implement an infrastructure for automating the negotiation of business contracts. Underlying our system is a declarative language for both (1) fully-specified, exe...
Daniel M. Reeves, Michael P. Wellman, Benjamin N. ...
IDMS
2001
Springer
133views Multimedia» more  IDMS 2001»
14 years 1 months ago
An Access Control Architecture for Metropolitan Area Wireless Networks
This paper introduces a novel access control architecture for publicly accessible, wireless networks. The architecture was designed to address the requirements obtained from a case...
Stefan Schmid, Joe Finney, Maomao Wu, Adrian Frida...
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
14 years 1 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser
SAC
2000
ACM
14 years 1 months ago
A Mobile Agent Infrastructure for the Mobility Support
The mobility of terminals and users is a crucial issue in the open global system represented by the Internet. Supporting terminal and user mobility requires a middleware infrastru...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...