Sciweavers

653 search results - page 27 / 131
» Security Architecture for Federated Cooperative Information ...
Sort
View
IJSTM
2000
117views more  IJSTM 2000»
13 years 7 months ago
Architectural design support for business process and business network engineering
Abstract: Concurrent enterprises and networks of business processes cannot function without each other. Cooperation in networks allows for faster reaction to business opportunities...
Henry M. Franken, René Bal, Harmen van den ...
CCS
2009
ACM
14 years 2 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
DBISP2P
2004
Springer
70views Database» more  DBISP2P 2004»
14 years 1 months ago
Using Information Retrieval Techniques to Route Queries in an InfoBeacons Network
We present the InfoBeacons system, in which a peer-to-peer network of beacons cooperates to route queries to the best information sources. The routing in our system uses techniques...
Brian F. Cooper
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 9 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
CEEMAS
2003
Springer
14 years 29 days ago
Communication Security in Multi-agent Systems
Both, research and application development in the area of multi-agent systems currently undertakes rapid expansion. In order to use multi-agent technology in real applications, it ...
Petr Novák, Milan Rollo, Jirí Hod&ia...