Sciweavers

2504 search results - page 47 / 501
» Enterprise Security Architecture
Sort
View
ACSAC
2000
IEEE
15 years 4 months ago
Security Architectures for Controlled Digital Information Dissemination
Jaehong Park, Ravi S. Sandhu, J. Schifalacqua
SAC
2009
ACM
15 years 4 months ago
Annotating UDDI registries to support the management of composite services
The future of service-centric environments suggests that organizations will dynamically discover and utilize web services for new business processes particularly those that span m...
M. Brian Blake, Michael F. Nowlan, Ajay Bansal, Sr...
IEEEARES
2009
IEEE
15 years 6 months ago
Risk-Driven Architectural Decomposition
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
AGENTS
2001
Springer
15 years 4 months ago
An architecture for action selection in robotic soccer
ÅÍÒ Ø ¹ Û × Ø ½ ÊÓ Ó ÙÔ ÖÓ ÓØ ×Ó Ö × ÑÙ¹ Ð ØÓÖ Ð Ù ÑÔ ÓÒº ÁÒ Ø ÊÓ Ó ÙÔ¹¾¼¼¼ ÓÑÔ Ø Ø ÓÒ¸ ÅÍÒ Ø ¹ Û × ÒØ Ö Ò Ò ...
Peter Stone, David A. McAllester
AGENTS
2000
Springer
15 years 4 months ago
Requirements for an architecture for believable social agents
Anthony Guye-Vuillème, Daniel Thalmann