Sciweavers

2979 search results - page 247 / 596
» Modelling secure multiagent systems
Sort
View
134
Voted
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
15 years 11 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila
158
Voted
COLCOM
2007
IEEE
15 years 9 months ago
Transparent security for collaborative environments
Current collaborative tools are often not able to profit from existing systems for user management. It is therefore necessary for collaborative systems to administrate their users ...
Eva Hladká, Daniel Kouril, Michal Proch&aac...
135
Voted
CORR
2010
Springer
140views Education» more  CORR 2010»
15 years 2 months ago
Soft Control on Collective Behavior of a Group of Autonomous Agents by a Shill Agent
This paper asks a new question: how can we control the collective behavior of self-organized multi-agent systems? We try to answer the question by proposing a new notion called `So...
Jing Han, Ming Li, Lei Guo
STORAGESS
2006
ACM
15 years 11 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller
CONTEXT
2003
Springer
15 years 10 months ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...