Sciweavers

2979 search results - page 295 / 596
» Modelling secure multiagent systems
Sort
View
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
15 years 4 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
ESORICS
2007
Springer
15 years 11 months ago
Obligations and Their Interaction with Programs
Obligations are pervasive in modern systems, often linked to access control decisions. We present a very general model of obligations as objects with state, and discuss its interac...
Daniel J. Dougherty, Kathi Fisler, Shriram Krishna...
ISM
2005
IEEE
109views Multimedia» more  ISM 2005»
15 years 10 months ago
A Trust Model for Ubiquitous Systems based on Vectors of Trust Values
Ubiquitous Computing foresees a massively networked world supporting a population of diverse but cooperating mobile devices where trust relationships between entities are uncertai...
Hassan Jameel, Hung Le Xuan, Umar Kalim, Ali Sajja...
UM
2001
Springer
15 years 9 months ago
User Modelling in I-Help: What, Why, When and How
This paper describes user modelling in I-Help, a system to facilitate communication amongst learners. There are two I-Help components: Private and Public Discussions. In the Privat...
Susan Bull, Jim E. Greer, Gordon I. McCalla, Lori ...
ATAL
2007
Springer
15 years 11 months ago
Exchanging reputation values among heterogeneous agent reputation models: an experience on ART testbed
In open MAS it is often a problem to achieve agents' interoperability. The heterogeneity of its components turns the establishment of interaction or cooperation among them in...
Anarosa Brandão, Laurent Vercouter, Sara J....