Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-secur...
We have replicated the experiments of Cecchet et al. detailed in ”Performance and Scalability of EJB Applications” at OOPSLA ’02. We report on our experiences configuring, ...
This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstra...
Xiangming Fang, Shoubao Yang, Leitao Guo, Lei Zhan...
Abstract. In this paper, we describe how the AGORA multi-agent architecture is used to support Virtual Enterprises(VE). Software agents represent the partners of a VE, who collabor...