Sciweavers

461 search results - page 70 / 93
» Privacy Enhancing Credentials
Sort
View
ACSAC
2002
IEEE
15 years 3 months ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
ACSAC
2002
IEEE
15 years 3 months ago
Representing TCP/IP Connectivity For Topological Analysis of Network Security
The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently avail...
Ronald W. Ritchey, Brian O'Berry, Steven Noel
AGENTS
2001
Springer
15 years 2 months ago
Social role awareness in animated agents
This paper promotes social role awareness as a desirable capability of animated agents, that are by now strong affective reasoners, but otherwise often lack the social competence ...
Helmut Prendinger, Mitsuru Ishizuka
AGENTS
2001
Springer
15 years 2 months ago
Evaluation of modeling techniques for agent-based systems
To develop agent-based systems, one needs a methodology that supports the development process as common in other disciplines. In recent years, several such methodologies and model...
Onn Shehory, Arnon Sturm
CCS
2001
ACM
15 years 2 months ago
Flexible authentication of XML documents
XML is increasingly becoming the format of choice for information exchange on the Internet. As this trend grows, one can expect that documents (or collections thereof) may get qui...
Premkumar T. Devanbu, Michael Gertz, April Kwong, ...