Sciweavers

12 search results - page 2 / 3
» A Contract-based Event Driven Model for Collaborative Securi...
Sort
View
IOR
2010
169views more  IOR 2010»
13 years 4 months ago
Dynamic Supplier Contracts Under Asymmetric Inventory Information
In this paper, we examine a supply chain in which a single supplier sells to a downstream retailer. We consider a multi-period model, with the following sequence of events. In per...
Hao Zhang, Mahesh Nagarajan, Greys Sosic
GI
2007
Springer
14 years 12 days ago
Achieving Semantic Interoperability By Using Complex Event Processing Technology
: State-of-the-art interoperability between heterogeneous systems on a technical level builds on services oriented architectures (SOA) for a given problem space. Semantics can be i...
Margarete Donovang-Kuhlisch
CONEXT
2009
ACM
13 years 7 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
14 years 9 days ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...
SASN
2005
ACM
13 years 11 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu