Sciweavers

123 search results - page 5 / 25
» Modeling the Trust Boundaries Created by Securable Objects
Sort
View
IJWIS
2007
153views more  IJWIS 2007»
13 years 10 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
PG
1999
IEEE
14 years 3 months ago
Boundary Determination for Trivariate Solids
The trivariate tensor-product B-spline solid is a direct extension of the B-spline patch and has been shown to be useful in the creation and visualization of free-form geometric s...
Kenneth I. Joy, Mark A. Duchaineau
IJNSEC
2008
190views more  IJNSEC 2008»
13 years 11 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid
CAEPIA
2009
Springer
13 years 12 months ago
Developing Strategies for the ART Domain
In this paper we propose the design of an agent for the ART Testbed, a tool created with the goal of objectively evaluate different trust strategies. The agent design includes a tr...
Javier Murillo, Víctor Muñoz, Beatri...
LATINCRYPT
2010
13 years 9 months ago
Broadcast Encryption with Multiple Trust Authorities
Abstract. In this paper we extend the notion of hierarchical identitybased encryption with wildcards (WIBE) from the domain of a single Trusted Authority (TA) to a setting with mul...
Kent D. Boklan, Alexander W. Dent, Christopher A. ...