Sciweavers

653 search results - page 115 / 131
» Security Architecture for Federated Cooperative Information ...
Sort
View
DAC
2007
ACM
14 years 8 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
HICSS
2007
IEEE
156views Biometrics» more  HICSS 2007»
14 years 2 months ago
Bridging Business Value Models and Process Models in Aviation Value Webs via Possession Rights
While exploring value webs -cooperating enterprises- it is common to view such webs from multiple perspectives: (1) the business value perspective, (2) the business process perspe...
Vincent Pijpers, Jaap Gordijn
ACMICEC
2006
ACM
150views ECommerce» more  ACMICEC 2006»
14 years 1 months ago
A framework for managing optimization models for supply chain software agents
As third party logistic services become popular, the role of software agents increases in importance in terms of the logistics scheduling of buyers and sellers. To support many mo...
Jae Kyu Lee, Yong Sik Chang
ENTCS
2007
103views more  ENTCS 2007»
13 years 7 months ago
Policy-based Coordination in PAGODA: A Case Study
PAGODA (Policy And GOal Based Distributed Autonomy) is a modular architecture for specifying and prototyping autonomous systems. A PAGODA node (agent) interacts with its environme...
Carolyn L. Talcott
CN
1999
115views more  CN 1999»
13 years 7 months ago
A large scale distributed intrusion detection framework based on attack strategy analysis
To appropriately address the problem of large-scale distributed intrusion assessment/detection, issues such as information exchange, work division and coordination amongst various...
Ming-Yuh Huang, Robert J. Jasper, Thomas M. Wicks