Sciweavers

3544 search results - page 81 / 709
» Information Security in Open Systems
Sort
View
HAIS
2008
Springer
15 years 3 days ago
Multi-agent System for Management and Monitoring of Routes Surveillance
This paper presents a multi-agent system for security control on industrial environments. The system uses a set of wireless technologies and software agents which integrate reasoni...
Sara Rodríguez, Javier Bajo
WWW
2005
ACM
15 years 11 months ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...
ICEIS
2009
IEEE
15 years 5 months ago
Security Analysis of the German Electronic Health Card's Peripheral Parts
Ali Sunyaev, Alexander Kaletsch, Christian Mauro, ...
ICEIS
2003
IEEE
15 years 4 months ago
An Architecture of a Secure Database for Networked Collaborative Activities
Manabu Ando, Kanta Matsuura, Michiharu Kudo, Akira...
ICSE
2009
IEEE-ACM
15 years 5 months ago
Semantics-based code search
Our goal is to use the vast repositories of available open source code to generate specific functions or classes that meet a user’s specifications. The key words here are spec...
Steven P. Reiss