Sciweavers

506 search results - page 41 / 102
» Electronic-internet business and security
Sort
View
ICMB
2005
IEEE
73views Business» more  ICMB 2005»
15 years 5 months ago
MMPS: A Versatile Mobile-to-Mobile Payment System
The paper presents an effective mobile-to-mobile payment system. A mobile phone with or without SIM card is enabled as an EMV payment instrument and is linked to a debit or credit...
Ashutosh Saxena, Manik Lal Das, Anurag Gupta
AGENTS
1999
Springer
15 years 4 months ago
A Methodology for Agent-Oriented Analysis and Design
This paper presents a methodology for agent-oriented analysis and design. The methodology is general, in that it is applicable to a wide range of multi-agent systems, and comprehe...
Michael Wooldridge, Nicholas R. Jennings, David Ki...
CSREAEEE
2006
149views Business» more  CSREAEEE 2006»
15 years 1 months ago
ALE Application Framework for Constructing Effective RFID Application
- RFID technology could greatly improve the business efficiency. EPCglobal Network suggests a kind of interface, called ALE (Application Level Events), for an efficient RFID develo...
Kyuhee An, Mokdong Chung
JNW
2008
83views more  JNW 2008»
14 years 12 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
SACMAT
2010
ACM
15 years 4 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller