The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
The paper presents how workflow-oriented, single-user Grid portals could be extended to meet the requirements of users with collaborative needs. Through collaborative Grid portals ...
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
While operating a crane for maximum productivity, the time of operation and the required energy are two important conflicting factors faced by a crane operator. In such a case, tr...
In this paper we describe PADUA, a protocol designed to enable agents to debate an issue drawing arguments not from a knowledge base of facts, rules and priorities but directly fro...
Maya Wardeh, Trevor J. M. Bench-Capon, Frans Coene...