Sciweavers

422 search results - page 8 / 85
» Protocol Specialization
Sort
View
ARGMAS
2004
Springer
15 years 5 months ago
Layered Strategies and Protocols for Argumentation-Based Agent Interaction
Abstract. Communication between agents needs to be flexible enough to encompass together a variety of different aspects such as, conformance to society protocols, private tactics ...
Antonis C. Kakas, Nicolas Maudet, Pavlos Moraitis
MAGS
2006
79views more  MAGS 2006»
14 years 11 months ago
Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids
In this paper, a novel protocol for providing both client and server anonymity in peer-to-peer (P2P) based grids is presented. The protocol assumes individual nodes or users to be...
Rohit Gupta, Souvik Ray, Arun K. Somani, Zhao Zhan...
ATAL
2007
Springer
15 years 5 months ago
Enacting protocols by commitment concession
Commitment protocols formalize interactions among autonomous, heterogeneous agents, leaving the agents’ local policies unspecified. This paper studies the problem of agents ena...
Pinar Yolum, Munindar P. Singh
CARDIS
2000
Springer
110views Hardware» more  CARDIS 2000»
15 years 4 months ago
Biometrics, Access Control, Smart Cards: A not so Simple Combination
Although biometrics can be an useful component for access control, the security they procure is often overestimated, as if they were a magic tool whose simple use will automatical...
Gaël Hachez, François Koeune, Jean-Jac...
DBSEC
2003
115views Database» more  DBSEC 2003»
15 years 1 months ago
Administration Rights in the SDSD-System
The SDSD-system offers state-dependent access control in distributed object systems. The system enforces protocols which declare sets of activity sequences as allowed, thereby for...
Joachim Biskup, Thomas Leineweber, Joerg Parthe