Sciweavers

240 search results - page 19 / 48
» Privacy and Utility in Business Processes
Sort
View
TRUSTBUS
2007
Springer
14 years 5 months ago
Usage Control in Service-Oriented Architectures
Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in gen...
Alexander Pretschner, Fabio Massacci, Manuel Hilty
AGENTS
1999
Springer
14 years 3 months ago
A Methodology for Agent-Oriented Analysis and Design
This paper presents a methodology for agent-oriented analysis and design. The methodology is general, in that it is applicable to a wide range of multi-agent systems, and comprehe...
Michael Wooldridge, Nicholas R. Jennings, David Ki...
COLCOM
2009
IEEE
14 years 3 months ago
Toward synchronization between decentralized orchestrations of composite web services
—Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation poin...
Walid Fdhila, Claude Godart
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
14 years 5 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
IJCAI
2007
14 years 10 days ago
Privacy and Artificial Agents, or, Is Google Reading My Email?
We investigate legal and philosophical notions of privacy in the context of artificial agents. Our analysis utilizes a normative account of privacy that defends its value and the ...
Samir Chopra, Laurence White