Bi-lateral negotiations represent an important class of encounter in agent-based systems. To this end, this paper develops and evaluates a heuristic model that enables an agent to...
As users, computers, data and processes become increasingly mobile and the diversity of interacting devices increases, pervasive computing tasks are difficult to predict and to u...
Public-key infrastructures are a prerequisite for security in distributed systems and for reliable electronic commerce. It is their goal to provide the authenticity of public keys...
Controlling access to resources is one of the most important protection goals for web-based services in practice. In general, access control requires identification of subjects t...
The ‘theorise-inquire’ technique is described, which supports the testing of both experts’ hunches and the quality of data sources. This technique is useful for the identifi...