In many different applications on the Web, distributed agents would like to discover and access high quality information sources. This is a challenging problem since an agent does...
— The establishment of shared cryptographic keys between communicating neighbor nodes in sensor networks is a challenging problem due to the unsuitability of asymmetric key crypt...
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Business Processes for Web Services are the new paradigm for lightweight enterprise integration. They cross organizational boundaries, are provided by entities that see each other ...
E-commerce strategists advise companies to create virtual communities for their customers. But what is involved in establishing and maintaining virtual communities? This paper add...