Sciweavers

610 search results - page 49 / 122
» Predicate-Based Key Exchange
Sort
View
ICIW
2007
IEEE
13 years 9 months ago
Analysis of Web Services Secure Conversation with Formal Methods
Web Services Secure Conversation extends Web Services Trust to provide mechanisms for establishing security consecurity context is an abstract concept that refers an authenticated...
M. Llanos Tobarra, Diego Cazorla, Fernando Cuarter...
CCS
2005
ACM
14 years 2 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
ATAL
2007
Springer
14 years 3 months ago
Semantical Concepts for a Formal Structural Dynamics of Situated Multiagent Systems
Abstract. This paper introduces semantical concepts to support a formal structural dynamics of situated multiagent systems. Multiagent systems are seen from the perspective of the ...
Antônio Carlos da Rocha Costa, Graçal...
ISI
2004
Springer
14 years 2 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
14 years 2 months ago
Virtual Organizing: Using Threads to Coordinate Distributed Work
This paper explores the critical role of conversational threads in facilitating the ongoing, distributed work of one virtual organization. In studying the electronic mail exchange...
JoAnne Yates, Wanda J. Orlikowski, Stephanie L. Wo...