Sciweavers

299 search results - page 56 / 60
» Managing Access Control for Presence-Based Services
Sort
View
SACMAT
2009
ACM
14 years 3 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
DSN
2002
IEEE
14 years 1 months ago
Transactional Rollback for Language-Based Systems
Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of t...
Algis Rudys, Dan S. Wallach
ESWS
2008
Springer
13 years 10 months ago
xOperator - An Extensible Semantic Agent for Instant Messaging Networks
Instant Messaging is in addition to Web and Email the most popular service on the Internet. With xOperator we demonstrate the implementation of a strategy which deeply integrates I...
Sebastian Dietzold, Jörg Unbehauen, Söre...
ESWS
2008
Springer
13 years 10 months ago
xOperator - Interconnecting the Semantic Web and Instant Messaging Networks
Instant Messaging (IM) is in addition to Web and Email the most popular service on the Internet. With xOperator we present a strategy and implementation which deeply integrates Ins...
Sebastian Dietzold, Jörg Unbehauen, Söre...
ATAL
2010
Springer
13 years 9 months ago
Bushfire BLOCKS: a modular agent-based simulation
Bushfire BLOCKS is a modular, distributed, agent-based simulation for exploring and informing bushfire response strategies. Separate independent modules capture the fire spread, e...
David Scerri, Ferdinand Gouw, Sarah L. Hickmott, I...