Sciweavers

43 search results - page 8 / 9
» Negotiation of Prohibition: An Approach Based on Policy Rewr...
Sort
View
SRDS
2010
IEEE
13 years 3 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
PCI
2005
Springer
13 years 10 months ago
A Graphical Rule Authoring Tool for Defeasible Reasoning in the Semantic Web
Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and inconsistent information. Such reasoning is useful for many applications in the Semantic W...
Nick Bassiliades, Efstratios Kontopoulos, Grigoris...
AGENTCL
2003
Springer
13 years 10 months ago
Intra-role Coordination Using Group Communication: A Preliminary Report
We propose group communication for agent coordination within “active rooms” and other pervasive computing scenarios featuring strict real-time requirements, inherently unrelia...
Paolo Busetta, Mattia Merzi, Silvia Rossi, Fran&cc...
ACSAC
2001
IEEE
13 years 9 months ago
Information Flow Analysis of Component-Structured Applications
Software component technology facilitates the costeffective development of specialized applications. Nevertheless, due to the high number of principals involved in a component-str...
Peter Herrmann
TCGOV
2005
Springer
13 years 10 months ago
Participatory Budget Formation Through the Web
Abstract. We describe a web-based system to support groups in elaborating participatory budgets. Rather than using physical meetings with voting mechanisms, we promote virtual meet...
Jesus Rios, David Ríos Insua, E. Fernandez,...