Sciweavers

1312 search results - page 137 / 263
» Embedded contract languages
Sort
View
AADEBUG
2005
Springer
15 years 9 months ago
Specifying and checking component usage
One of today’s challenges is producing reliable software in the face of an increasing number of interacting components. Our system CHET lets developers define specifications des...
Steven P. Reiss
PET
2004
Springer
15 years 8 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
ATAL
2003
Springer
15 years 8 months ago
Norm adoption in the NoA agent architecture
Agents based on reactive planning architectures use pre-specified plans as behaviour specifications. Normative agents are motivated by norms in their behaviour: obligations motiva...
Martin J. Kollingbaum, Timothy J. Norman
ICADL
2003
Springer
149views Education» more  ICADL 2003»
15 years 8 months ago
Approximating Fair Use in LicenseScript
Current rights management systems are not able to enforce copyright laws because of both legal and technological reasons. The contract rights granted by a copyright owner are often...
Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel,...
131
Voted
DANCE
2002
IEEE
15 years 8 months ago
A Secure PLAN
— Active Networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This paper describes...
Michael W. Hicks, Angelos D. Keromytis, Jonathan M...