Sciweavers

2808 search results - page 545 / 562
» Mobile Agent Security
Sort
View
DSN
2002
IEEE
14 years 2 months ago
Transactional Rollback for Language-Based Systems
Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of t...
Algis Rudys, Dan S. Wallach
ER
2001
Springer
170views Database» more  ER 2001»
14 years 2 months ago
XDoC-WFMS: A Framework for Document Centric Workflow Management System
Document Management is an important component of a workflow management system. XML has become a prominent language for document processing and management, and has an additional adv...
Rupa Krishnan, Lalitha Munaga, Kamalakar Karlapale...
PADL
2001
Springer
14 years 2 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
ICDCS
1998
IEEE
14 years 2 months ago
A Mechanism for Establishing Policies for Electronic Commerce
This paper introduces a mechanism for establishing policies for electronic commerce in a uni ed and secure manner. A commercial policy can be viewed as the embodiment of a contrac...
Naftaly H. Minsky, Victoria Ungureanu
AUTONOMICS
2008
ACM
13 years 12 months ago
Emergent engineering for the management of complex situations
Ubiquitous computing and communication environments connect systems and people in unprecedented ways, but also fundamentally challenge the mindset of traditional systems engineeri...
René Doursat, Mihaela Ulieru