Sciweavers

762 search results - page 107 / 153
» Modeling and Simulating Information Security Management
Sort
View
CONTEXT
2007
Springer
14 years 1 months ago
Context-Oriented Domain Analysis
Context-aware systems are software systems which adapt their behaviour according to the context of use. The requirements engineering phase is recognized as a primordial step to dev...
Brecht Desmet, Jorge Vallejos, Pascal Costanza, Wo...
AP2PC
2003
Springer
14 years 29 days ago
A Robust and Scalable Peer-to-Peer Gossiping Protocol
Abstract. The newscast model is a general approach for communication in large agent-based distributed systems. The two basic services— membership management and information disse...
Spyros Voulgaris, Márk Jelasity, Maarten va...
BPM
2004
Springer
110views Business» more  BPM 2004»
14 years 1 months ago
Integration of Multi-attributed Negotiations within Business Processes
For the integration of electronic negotiation systems within information systems, it is essential to model both using the same modelling paradigm to avoid frictions. We develop a g...
Carlo Simon, Michael Rebstock
WPES
2003
ACM
14 years 29 days ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
CCS
2005
ACM
14 years 1 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone