Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in gen...
Alexander Pretschner, Fabio Massacci, Manuel Hilty
This paper presents a methodology for agent-oriented analysis and design. The methodology is general, in that it is applicable to a wide range of multi-agent systems, and comprehe...
Michael Wooldridge, Nicholas R. Jennings, David Ki...
—Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation poin...
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
We investigate legal and philosophical notions of privacy in the context of artificial agents. Our analysis utilizes a normative account of privacy that defends its value and the ...