Sciweavers

2979 search results - page 95 / 596
» Modelling secure multiagent systems
Sort
View
128
Voted
ECMDAFA
2008
Springer
97views Hardware» more  ECMDAFA 2008»
15 years 4 months ago
Model-Driven Security in Practice: An Industrial Experience
Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...
124
Voted
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 8 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
ACSAC
1999
IEEE
15 years 7 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
123
Voted
SASO
2008
IEEE
15 years 9 months ago
The Meaning of Semiochemicals to the Design of Self-Organizing Systems
In biology, many organisms coordinate their interactions in a self-organizing and emergent way solely by means of indirect communication based on chemical substances. These so-cal...
Holger Kasinger, Bernhard Bauer, Jörg Denzing...
150
Voted
ATAL
2005
Springer
15 years 8 months ago
Coordinated exploration in multi-agent reinforcement learning: an application to load-balancing
This paper is concerned with how multi-agent reinforcement learning algorithms can practically be applied to real-life problems. Recently, a new coordinated multi-agent exploratio...
Katja Verbeeck, Ann Nowé, Karl Tuyls