SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
This paper describes simulations designed to test the relative efficiency of two different sequential auction mechanisms for allocating compute resources between users in a shared...
In this paper we describe Towel, a task management application that couples a user’s to-do list with a software personal assistant. This to-do list provides a unified environmen...
This paper is concerned with the development of a MultiAgent System (MAS) supporting ubiquitous and personalized interaction with Active Environments. In particular, we propose a ...
Giovanni Cozzolongo, Berardina De Carolis, Sebasti...
Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is...