Sciweavers

2979 search results - page 250 / 596
» Modelling secure multiagent systems
Sort
View
133
Voted
CLIMA
2004
15 years 6 months ago
Contextual Taxonomies
Abstract. We provide a formal characterization of a notion of contextual taxonomy, that is to say, a taxonomy holding only with respect to a specific context. To this aim, a new pr...
Davide Grossi, Frank Dignum, John-Jules Ch. Meyer
133
Voted
AAMAS
2007
Springer
15 years 5 months ago
Conversational semantics sustained by commitments
We propose an operational model that combines message meaning and conversational structure in one comprehensive approach. Our long-term research goal is to lay down principles unit...
Roberto A. Flores, Philippe Pasquier, Brahim Chaib...
146
Voted
SACMAT
2003
ACM
15 years 10 months ago
PBDM: a flexible delegation model in RBAC
Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control...
Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
142
Voted
CSFW
1999
IEEE
15 years 9 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
CCS
2008
ACM
15 years 7 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...