Sciweavers

1790 search results - page 339 / 358
» On Privacy Models for RFID
Sort
View
LISA
2004
14 years 9 days ago
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management
Spyware is a rapidly spreading problem for PC users causing significant impact on system stability and privacy concerns. It attaches to extensibility points in the system to ensur...
Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron...
PDPTA
2004
14 years 9 days ago
Semantic Extensions for the Virtual Enterprise's Grid Infastructure
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows collab...
Ziga Turk, Vlado Stankovski, Matevz Dolenc, Tomo C...
PST
2004
14 years 9 days ago
Determining Internet Users' Values for Private Information
We examine the problem of determining a user's value for his/her private information. Web businesses often offer rewards, such as discounts, free downloads and website persona...
Scott Buffett, Nathan Scott, Bruce Spencer, Michae...
TNC
2004
103views Education» more  TNC 2004»
14 years 9 days ago
Roaming Network Access Using Shibboleth
There are activities aiming at abling users to dock to a wireless or wired network while visiting organisations outside the premises of their usual connection to the network. Thes...
Mikael Linden, Viljo Viitanen
AAMAS
2007
Springer
13 years 11 months ago
An agent architecture for multi-attribute negotiation using incomplete preference information
A component-based generic agent architecture for multi-attribute (integrative) negotiation is introduced and its application is described in a prototype system for negotiation abo...
Catholijn M. Jonker, Valentin Robu, Jan Treur