We try to analyze a generic model for 2-tier distributed systems, exploring the possibility of optimal cluster sizes from an information management perspective, such that the over...
Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
Digital signatures, like physical signatures, can verify that a specific user affixed their signature to a document and they can also verify that the document is the same as when ...
Mobile agents are an emerging approach to develop distributed and parallel applications. They also can be exploited to develop enterprise applications, since they can act as activ...
This paper describes the implementation of a collaboration tool for learning groups. The tool is embedded in an e- and m-learning environment at the University of Regensburg which...
The first “Agent-based Computing for Enterprise Collaboration” workshop at WETICE aimed at bringing together researcher in the field of collaboration supported by software age...