Sciweavers

989 search results - page 104 / 198
» An information-based model for trust
Sort
View
ICDCIT
2004
Springer
15 years 4 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
SIGUCCS
1999
ACM
15 years 3 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry
CAISE
2003
Springer
15 years 4 months ago
Context Modeling for Web Information Systems
Context modeling shall lead to better aid customers in achieving intents that evolve throughout a session. A static approach to it has been proposed. This approach is not satisfact...
Roland Kaschek, Klaus-Dieter Schewe, Bernhard Thal...
DLOG
2003
15 years 15 days ago
Conceptual Modeling with Description Logics
The purpose of the chapter is to help someone familiar with DLs to understand the issues involved in developing an ontology for some universe of discourse, which is to become a co...
Alexander Borgida, Ronald J. Brachman
72
Voted
DSOM
2006
Springer
15 years 2 months ago
CMDB - Yet Another MIB? On Reusing Management Model Concepts in ITIL Configuration Management
According to ITIL, a CMDB (Configuration Management Database), containing a logical model of the IT infrastructure, forms the basis for effective and efficient IT Service Managemen...
Michael Brenner, Markus Garschhammer, Martin Saile...