Sciweavers

792 search results - page 56 / 159
» Mixed-initiative security agents
Sort
View
ICDCSW
2003
IEEE
15 years 7 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
132
Voted
AGENTS
2001
Springer
15 years 6 months ago
Exploring decision processes in multi-agent automated contracting
We are interested in multi-agent contracting, in which customers must solicit the resources and capabilities of other, self-interested agents in order to accomplish their goals. G...
John Collins, Maria L. Gini
AAAI
2008
15 years 4 months ago
Efficient Algorithms to Solve Bayesian Stackelberg Games for Security Applications
In a class of games known as Stackelberg games, one agent (the leader) must commit to a strategy that can be observed by the other agent (the adversary/follower) before the advers...
Praveen Paruchuri, Jonathan P. Pearce, Janusz Mare...
BIRTHDAY
2008
Springer
15 years 4 months ago
Secure Data Flow in a Calculus for Context Awareness
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computin...
Doina Bucur, Mogens Nielsen
HAIS
2008
Springer
15 years 3 months ago
Multi-agent System for Management and Monitoring of Routes Surveillance
This paper presents a multi-agent system for security control on industrial environments. The system uses a set of wireless technologies and software agents which integrate reasoni...
Sara Rodríguez, Javier Bajo