Sciweavers

243 search results - page 36 / 49
» Secure mobile agent systems using Java: where are we heading
Sort
View
USS
2008
15 years 5 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
114
Voted
AGENTS
1997
Springer
15 years 7 months ago
Progressive Negotiation For Time-Constrained Autonomous Agents
We address in this paper a problem of autonomous agents performing in a common environment where each agent has its goal to achieve before a given deadline. Agents must be able to...
Abdel-Illah Mouaddib
ITRUST
2005
Springer
15 years 9 months ago
Modeling Social and Individual Trust in Requirements Engineering Methodologies
Abstract. When we model and analyze trust in organizations or information systems we have to take into account two different levels of analysis: social and individual. Social leve...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
DSN
2002
IEEE
15 years 8 months ago
Transactional Rollback for Language-Based Systems
Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of t...
Algis Rudys, Dan S. Wallach
TROB
2008
159views more  TROB 2008»
15 years 3 months ago
Distributed Connectivity Control of Mobile Networks
Control of mobile networks raises fundamental and novel problems in controlling the structure of the resulting dynamic graphs. In particular, in applications involving mobile senso...
Michael M. Zavlanos, George J. Pappas