Sciweavers

792 search results - page 89 / 159
» Mixed-initiative security agents
Sort
View
CIMCA
2006
IEEE
14 years 3 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
VRCAI
2006
ACM
14 years 3 months ago
Advanced virtual reality technologies for surveillance and security applications
We present a system that exploits advanced Virtual Reality technologies to create a surveillance and security system. Surveillance cameras are carried by a mini Blimp which is tel...
Renaud Ott, Mario Gutiérrez, Daniel Thalman...
BIOSIG
2008
159views Biometrics» more  BIOSIG 2008»
13 years 10 months ago
TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management
: Federated Single-Sign-On using web browsers as User Agents becomes increasingly important. However, current proposals require substantial changes in the implementation of the Rel...
Bud P. Bruegger, Detlef Hühnlein, Jörg S...
CDC
2009
IEEE
133views Control Systems» more  CDC 2009»
14 years 1 months ago
On the security of linear consensus networks
Abstract—This work considers the problem of reaching consensus in an unreliable linear consensus network. A solution to this problem is relevant for several tasks in multi-agent ...
Fabio Pasqualetti, Antonio Bicchi, Francesco Bullo
NDSS
1998
IEEE
14 years 1 months ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...