Sciweavers

2281 search results - page 262 / 457
» Security Patterns and Secure Systems Design
Sort
View
141
Voted
POPL
2005
ACM
15 years 9 months ago
Specifying Kerberos 5 cross-realm authentication
Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. We present a formalizat...
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...
122
Voted
HOLOMAS
2003
Springer
15 years 9 months ago
Agent Exchange - Virtual Trading Environment
Agent Exchange is a virtual trading environment serving as a test bed for experiments with market simulations, trading strategies and auctioning techniques. Agent Exchange is the d...
Jirí Hodík, Milan Rollo, Petr Nov&aa...
159
Voted
AGENTS
2001
Springer
15 years 8 months ago
A knowledge level software engineering methodology for agent oriented programming
Our goal in this paper is to introduce and motivatea methodology, called Tropos, for building agent oriented software systems. Tropos is based on two key ideas. First, the notion ...
Paolo Bresciani, Anna Perini, Paolo Giorgini, Faus...
91
Voted
ACSAC
2000
IEEE
15 years 8 months ago
A Reliable, Scalable General-Purpose Certificate Store
Although there have been various proposals to build large-scale PKIs, there appears to be no research publicly available on the underlying certificate store which will be required...
Peter Gutmann
109
Voted
AGENTS
1997
Springer
15 years 7 months ago
Story-Making with Improvisational Puppets
"Improv Puppets'' is an interaction paradigm modeled after traditional puppet play. With physical puppets, children move their puppets' bodies and speak their ...
Barbara Hayes-Roth, Robert van Gent