This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
e-Negotiation involves two or more agents multilaterally bargaining for mutual gain, using information technologies in a cooperative problem-solving (CPS) environment. This paper ...
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
To achieve success at supply chain management (SCM), an organization must possess--and share-knowledge about the different facets of the supply chain. Lack of information sharing ...
The Web, the collection of all devices connected to the Internet, is on the verge of experiencing a massive evolution from a Web of Computers to a Web of Things as new devices suc...
Bernard Traversat, Mohamed Abdelaziz, Dave Doolin,...