Sciweavers

3544 search results - page 57 / 709
» Information Security in Open Systems
Sort
View
AGENTS
2000
Springer
15 years 3 months ago
Open Source, Standards and Scaleable Agencies
Numerous agencies and agent systems are being developed or portrayed as vehicles to deliver novel types of e-commerce services to users. However service agents in one agency are p...
Stefan Poslad, Phil Buckle, Rob Hadingham
SOUPS
2005
ACM
15 years 4 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
IDTRUST
2010
ACM
15 years 3 months ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
ECAI
2004
Springer
15 years 4 months ago
FIRE: An Integrated Trust and Reputation Model for Open Multi-Agent Systems
Trust and reputation are central to effective interactions in open multi-agent systems in which agents, that are owned by a variety of stakeholders, can enter and leave the system ...
Trung Dong Huynh, Nicholas R. Jennings, Nigel R. S...
CAISE
2004
Springer
15 years 4 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau