Sciweavers

2979 search results - page 315 / 596
» Modelling secure multiagent systems
Sort
View
ICSE
2008
IEEE-ACM
16 years 4 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
15 years 11 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
15 years 8 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
WIKIS
2010
ACM
15 years 2 months ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...
COORDINATION
2000
Springer
15 years 9 months ago
The LuCe Coordination Technology for MAS Design and Development on the Internet
Internet-based multi-agent systems call for new metaphors, abstractions, methodologies and enabling technologies specifically tailored to agent-oriented engineering. While coordin...
Enrico Denti, Andrea Omicini, Vladimiro Toschi