Sciweavers

171 search results - page 35 / 35
» Consenting Agents: Negotiation Mechanisms for Multi-Agent Sy...
Sort
View
SRDS
2010
IEEE
13 years 3 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...