Sciweavers

2704 search results - page 448 / 541
» Constraint Management in Engineering of Complex Information ...
Sort
View
SWS
2004
ACM
15 years 7 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
HICSS
2003
IEEE
152views Biometrics» more  HICSS 2003»
15 years 6 months ago
Advanced Technology and Knowledge Transfer
This paper reports on a specific food and agribusiness industry project, employing new technological capabilities to better transfer expert knowledge. Knowledge transfer and techn...
Geetanjali Tandon, Steven T. Sonka
ATAL
2003
Springer
15 years 6 months ago
Representation and reasoning for DAML-based policy and domain services in KAoS and nomads
To increase the assurance with which agents can be deployed in operational settings, we have been developing the KAoS policy and domain services. In conjunction with Nomads strong...
Jeffrey M. Bradshaw, Andrzej Uszok, Renia Jeffers,...
102
Voted
AAAI
2006
15 years 2 months ago
Contract Enactment in Virtual Organizations: A Commitment-Based Approach
A virtual organization (VO) is a dynamic collection of entities (individuals, enterprises, and information resources) collaborating on some computational activity. VOs are an emer...
Yathiraj B. Udupi, Munindar P. Singh
SIGOPS
2008
156views more  SIGOPS 2008»
15 years 1 months ago
O2S2: enhanced object-based virtualized storage
Object based storage devices (OSDs) elevate the level of abstraction presented to clients, thereby permitting them to offer methods for managing, sharing, and securing information...
Himanshu Raj, Karsten Schwan