Sciweavers

WETICE
1998
IEEE
14 years 24 days ago
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
James M. Hayes
WETICE
1998
IEEE
14 years 24 days ago
A Deontic Formalism for Co-ordinating Software Development in Virtual Software Corporations
The concept of the Virtual Software Corporation (VSC) has recently become a practical reality as a result of advances in communication and distributed technologies. However, there...
Zsolt Haag, Richard Foley, Julian Newman
WETICE
1998
IEEE
14 years 24 days ago
Software Agents: Process Models and User Profiles in Distributed Software Development
The development of software products has become a highly cooperative and distributed activity involving working groups at geographically distinct places. These groups show an incr...
Norbert Glaser, Jean-Claude Derniame
WETICE
1998
IEEE
14 years 24 days ago
Flexible Handling of Work Processes by Situation-Dependent Support Strategies
Although work pr ocesses, like software pr ocesses, include a number of process aspects such as defined phases and deadlines, they are not plannable in detail. Howe ver, the advan...
Gert Faustmann
WETICE
1998
IEEE
14 years 24 days ago
An Open Architecture for Supporting Collaboration on the Web
The MEMOIR framework supports researchers working with a vast quantity of distributed information, by assisting them in finding both relevant documents and researchers with relate...
David De Roure, Wendy Hall, Siegfried Reich, Aggel...
WETICE
1998
IEEE
14 years 24 days ago
Setting up a Secure Web Server and Clients on an Intranet
This paper discusses the practical issues that arise when securing the access to the World Wide Web (WWW). A brief overview of the different protocols that are proposed to secure ...
Joris Claessens, Mark Vandenwauver, Bart Preneel, ...
WETICE
1998
IEEE
14 years 24 days ago
A Framework for Adaptive Process Modeling and Execution (FAME)
This paper describes the architecture and concept of operation of a Framework for Adaptive Process Modeling and Execution (FAME). The research addresses the absence of robust meth...
Perakath C. Benjamin, Madhav Erraguntla, Richard J...
WETICE
1998
IEEE
14 years 24 days ago
Interactive Mobile Agents in X-Klaim
Mobile agents are processes which can migrate and execute on new hosts. Mobility is a key concept for network programming; it has stimulated much research about new programming la...
Lorenzo Bettini, Rocco De Nicola, Rosario Pugliese...
WETICE
1998
IEEE
14 years 24 days ago
Coordinating Management Activities in Distributed Software Development Projects
Fawsy Bendeck, Sigrid Goldmann, Harald Holz, Boris...
WETICE
1998
IEEE
14 years 24 days ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...