Sciweavers

1286 search results - page 99 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
GG
2004
Springer
15 years 6 months ago
A Perspective on Graphs and Access Control Models
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Ravi S. Sandhu
VIS
2004
IEEE
163views Visualization» more  VIS 2004»
16 years 2 months ago
Dispersion Simulation and Visualization For Urban Security
We present a system for simulating and visualizing the propagation of dispersive contaminants with an application to urban security. In particular, we simulate airborne contaminan...
Arie E. Kaufman, Feng Qiu, Haik Lorenz, Jianning W...
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 6 months ago
From Computer Networks to Agent Networks
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...
Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya...
HPDC
2010
IEEE
15 years 1 months ago
A perspective on scientific cloud computing
Cloud computing has the potential for tremendous benefits, but wide scale adoption has a range of challenges that must be met. We review these challenges and how they relate to sc...
Craig A. Lee
ITNG
2007
IEEE
15 years 7 months ago
Securing Agent-Oriented Systems: An Argumentation and Reputation-based Approach
In this paper, we propose a new model for securing agent-based systems in which agents are equipped with reasoning capabilities allowing them to interact with each other. The agen...
Jamal Bentahar, John-Jules Ch. Meyer, Bernard Moul...