Sciweavers

WETICE
1998
IEEE
13 years 9 months ago
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
James M. Hayes
WETICE
1998
IEEE
13 years 9 months ago
A Deontic Formalism for Co-ordinating Software Development in Virtual Software Corporations
The concept of the Virtual Software Corporation (VSC) has recently become a practical reality as a result of advances in communication and distributed technologies. However, there...
Zsolt Haag, Richard Foley, Julian Newman
WETICE
1998
IEEE
13 years 9 months ago
Software Agents: Process Models and User Profiles in Distributed Software Development
The development of software products has become a highly cooperative and distributed activity involving working groups at geographically distinct places. These groups show an incr...
Norbert Glaser, Jean-Claude Derniame
WETICE
1998
IEEE
13 years 9 months ago
Flexible Handling of Work Processes by Situation-Dependent Support Strategies
Although work pr ocesses, like software pr ocesses, include a number of process aspects such as defined phases and deadlines, they are not plannable in detail. Howe ver, the advan...
Gert Faustmann
WETICE
1998
IEEE
13 years 9 months ago
An Open Architecture for Supporting Collaboration on the Web
The MEMOIR framework supports researchers working with a vast quantity of distributed information, by assisting them in finding both relevant documents and researchers with relate...
David De Roure, Wendy Hall, Siegfried Reich, Aggel...
WETICE
1998
IEEE
13 years 9 months ago
Setting up a Secure Web Server and Clients on an Intranet
This paper discusses the practical issues that arise when securing the access to the World Wide Web (WWW). A brief overview of the different protocols that are proposed to secure ...
Joris Claessens, Mark Vandenwauver, Bart Preneel, ...
WETICE
1998
IEEE
13 years 9 months ago
A Framework for Adaptive Process Modeling and Execution (FAME)
This paper describes the architecture and concept of operation of a Framework for Adaptive Process Modeling and Execution (FAME). The research addresses the absence of robust meth...
Perakath C. Benjamin, Madhav Erraguntla, Richard J...
WETICE
1998
IEEE
13 years 9 months ago
Interactive Mobile Agents in X-Klaim
Mobile agents are processes which can migrate and execute on new hosts. Mobility is a key concept for network programming; it has stimulated much research about new programming la...
Lorenzo Bettini, Rocco De Nicola, Rosario Pugliese...
WETICE
1998
IEEE
13 years 9 months ago
Coordinating Management Activities in Distributed Software Development Projects
Fawsy Bendeck, Sigrid Goldmann, Harald Holz, Boris...
WETICE
1998
IEEE
13 years 9 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...