Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Information extraction approaches are heavily used to gather product information on the Web, especially focusing on technical product specifications. If requesting different sour...
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Ad-hoc and situational applications for personal use will gain more and more traction in the work support for knowledge workers (KWers). Personal information is a key element in th...
Trust and reputation are central to effective interactions in open multi-agent systems in which agents, that are owned by a variety of stakeholders, can enter and leave the system ...
Trung Dong Huynh, Nicholas R. Jennings, Nigel R. S...