Sciweavers

859 search results - page 53 / 172
» Security for Key Management Interfaces
Sort
View
TII
2008
132views more  TII 2008»
13 years 9 months ago
Credential Management for Automatic Identification Solutions in Supply Chain Management
Current systems for automatic identification of goods presume a single administrative domain. However, in supply chain management systems temporary cooperations of multiple compani...
Marcel Henseler, Michael Rossberg, Guenter Schaefe...
AGENTS
1999
Springer
14 years 2 months ago
Agent Development with Jackal
Jackal is a Java-based tool for communicatingwith the KQML agent communication language. Some features that make it extremely valuable to agent development are its conversation ma...
R. Scott Cost, Timothy W. Finin, Yannis Labrou, Xi...
DAIS
2003
13 years 11 months ago
Towards an Intuitive Interface for Tailored Service Compositions
Abstract. Novel modes of interaction and tailored application delivery are a key challenge in ubiquitous computing. This paper proposes a method of adaptively delivering lightweigh...
Steffen Higel, Tony O'Donnell, David Lewis, Vincen...
ICDCSW
2002
IEEE
14 years 2 months ago
Reducing the Cost of the Critical Path in Secure Multicast for Dynamic Groups
In this paper, we focus on the problem of secure multicast in dynamic groups. In this problem, a group of users communicate using a shared key. Due to the dynamic nature of these ...
Sandeep S. Kulkarni, Bezawada Bruhadeshwar
JUCS
2002
112views more  JUCS 2002»
13 years 9 months ago
Ontology-Based Skills Management: Goals, Opportunities and Challenges
: Establishing electronically accessible repositories of people's capabilities, experiences, and key knowledge areas is key in setting up Enterprise Knowledge Management. A sk...
Jacqueline Renée Reich, Peter Brockhausen, ...