Sciweavers

6555 search results - page 917 / 1311
» Secure attribute-based systems
Sort
View
134
Voted
ECIS
2000
15 years 6 months ago
Full Bindingness and Confidentiality
As electronic commerce will increase, players will increasingly wish to have signed documents and strong encryption. According to current knowledge, it must be expected that the co...
Arnd Weber
152
Voted
RBAC
1997
135views more  RBAC 1997»
15 years 6 months ago
Reconciling role based management and role based access control
Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Base...
Emil Lupu, Morris Sloman
153
Voted
ATAL
2009
Springer
15 years 6 months ago
Towards an Architecture for Self-regulating Agents: A Case Study in International Trade
Abstract--Norm-enforcement models applied in human societies may serve as an inspiration for the design of multi-agent systems. Models for norm-enforcement in multi-agent systems o...
Brigitte Burgemeestre, Joris Hulstijn, Yao-Hua Tan
CORR
2008
Springer
125views Education» more  CORR 2008»
15 years 5 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
ICRA
2010
IEEE
195views Robotics» more  ICRA 2010»
15 years 3 months ago
Cooperative tracking of moving objects and face detection with a dual camera sensor
— This paper describes a sensor for autonomous surveillance capable of continuously monitoring the environment, while acquiring detailed images of specific areas. This is achiev...
Stefano Ghidoni, Alberto Pretto, Emanuele Menegatt...