Sciweavers

792 search results - page 91 / 159
» Mixed-initiative security agents
Sort
View
SP
1997
IEEE
112views Security Privacy» more  SP 1997»
14 years 1 months ago
Analyzing Consistency of Security Policies
This paper discusses the development of a methodology for reasoning about properties of security policies. We view a security policy as a special case of regulation which specifi...
Laurence Cholvy, Frédéric Cuppens
SEC
2001
13 years 10 months ago
On Securely Scheduling a Meeting
Abstract When people want to schedule a meeting, their agendas must be compared to find a time suitable for all participants. At the same time, people want to keep their agendas pr...
T. Herlea, Joris Claessens, Bart Preneel, Gregory ...
AGENTS
2001
Springer
14 years 1 months ago
Representing social structures in UML
From a software engineering perspective, agent systems are a specialization of object-oriented (OO) systems, in which individual objects have their own threads of control and thei...
H. Van Dyke Parunak, James Odell
CSFW
2004
IEEE
14 years 23 days ago
Symbolic Model Checking the Knowledge of the Dining Cryptographers
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
Ron van der Meyden, Kaile Su
IEEECIT
2006
IEEE
14 years 3 months ago
Multi-Agent based Data Integration in Real-world
This paper presents a Multi-Agent based Data Integration (MADI) framework for integrating distributed data source across Internet. This framework takes control on high-availabilit...
Yintang Dai, Shiyong Zhang