Sciweavers

177 search results - page 22 / 36
» Privacy Preserving Collaborative Business Process Management
Sort
View
GIS
2009
ACM
16 years 24 days ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
ACSAC
1999
IEEE
15 years 4 months ago
An Asynchronous Distributed Access Control Architecture for IP over ATM Networks
In this article, we describe a new architecture providing the access control service in both ATM and IPover-ATM networks. This architecture is based on agents distributed in netwo...
Olivier Paul, Maryline Laurent, Sylvain Gombault
AGILEDC
2007
IEEE
15 years 6 months ago
Agile Program Management: Lessons Learned from the VeriSign Managed Security Services Team
This report examines how the VeriSign Managed Security Services team (MSS) has successfully extended agile software development practices to deal with a complex, multi-product dev...
Peter Hodgkins, Luke Hohmann
COLLABORATION
1999
Springer
15 years 4 months ago
A Service-Oriented Negotiation Model between Autonomous Agents
Abstract. We present a formal model of negotiation between autonomous agents. The purpose of the negotiation is to reach an agreement about the provision of a service by one agent ...
Carles Sierra, Peyman Faratin, Nicholas R. Jenning...
AGENTS
1999
Springer
15 years 4 months ago
A Methodology for Agent-Oriented Analysis and Design
This paper presents a methodology for agent-oriented analysis and design. The methodology is general, in that it is applicable to a wide range of multi-agent systems, and comprehe...
Michael Wooldridge, Nicholas R. Jennings, David Ki...