Sciweavers

376 search results - page 21 / 76
» Integrity constraints in trust management
Sort
View
WISA
2007
Springer
15 years 8 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
COOPIS
1994
IEEE
15 years 6 months ago
Ontologies for Enterprise Integration
We present a logical framework for representing the agents in two different cooperating information systems. We define an architecture for Integrated Supply Chain Management in wh...
Mark S. Fox, Michael Grüninger
ICCAD
1994
IEEE
122views Hardware» more  ICCAD 1994»
15 years 6 months ago
An enhanced flow model for constraint handling in hierarchical multi-view design environments
In this paper we present an enhanced design flow model that increases the capabilities of a CAD framework to support design activities on hierarchical multi-view design descriptio...
Pieter van der Wolf, K. Olav ten Bosch, Alfred van...
IDT
2007
83views more  IDT 2007»
15 years 1 months ago
Negotiating flexible agreements by combining distributive and integrative negotiation
This paper presents an approach to automated negotiation between agents which attempts to combine the advantages of a co-operative value adding approach, with the reality that neg...
Quoc Bao Vo, Lin Padgham, Lawrence Cavedon
MIDDLEWARE
2010
Springer
15 years 11 days ago
Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications
Recent Internet applications, such as online social networks and user-generated content sharing, produce an unprecedented amount of social information, which is further augmented b...
Nicolas Kourtellis, Joshua Finnis, Paul Anderson, ...