Sciweavers

3544 search results - page 86 / 709
» Information Security in Open Systems
Sort
View
AINA
2006
IEEE
15 years 5 months ago
Performance Analysis of Network Topologies in Agent-based Open Connectivity Architecture for DSS
Performance analysis of agent network topologies helps multi-agent system developers to understand the impact of topology on system efficiency and effectiveness. Appropriate topol...
Hao Lan Zhang, Clement H. C. Leung, Gitesh K. Raik...
ELPUB
2007
ACM
15 years 3 months ago
A Lifeboat Doesn't Do You any Good if it's not There when You Need it: Open Access and its Place in the New Electronic Publishin
This paper draws on the results of recent research into digital publishing in Latin America sponsored by the European Commission's ALFA programme. It outlines the growth in p...
Ian M. Johnson
MOBICOM
1999
ACM
15 years 3 months ago
Next Century Challenges: Nexus - An Open Global Infrastructure for Spatial-Aware Applications
Due to the lack of a generic platform for location- and spatial-aware systems, many basic services have to be reimplemented in each application that uses spatial-awareness. A coop...
Fritz Hohl, Uwe Kubach, Alexander Leonhardi, Kurt ...
CAISE
2000
Springer
15 years 3 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
BIS
2008
86views Business» more  BIS 2008»
15 years 15 days ago
Specifying Separation of Duty Constraints in BPEL4People Processes
Abstract. Security issues have to be carefully considered for information systems that support the business processes of an organization, in particular, when these systems build on...
Jan Mendling, Karsten Ploesser, Mark Strembeck