Sciweavers

981 search results - page 97 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
ESORICS
2007
Springer
15 years 7 months ago
Incorporating Temporal Capabilities in Existing Key Management Schemes
The problem of key management in access hierarchies studies ways to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independentl...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
BIRTHDAY
2011
Springer
14 years 1 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani
AINA
2007
IEEE
15 years 5 months ago
On the Design of an Efficient Architecture for Supporting Large Crowds of Autonomous Agents
Crowd simulations require both rendering visually plausible images and managing the behavior of autonomous agents. Therefore, these applications need an efficient design that allo...
Miguel Lozano, Pedro Morillo, Juan M. Orduñ...
PDPTA
2004
15 years 2 months ago
An Integrated Global Service for File Transfer and Management in a Network (FTM)
The management and access of distributed informational resources has emerged as an important requirement for scientific simulations using high-performance computing facilities. Bot...
Jim Almond, Peggy Lindner
CSFW
2002
IEEE
15 years 6 months ago
Secrecy in Multiagent Systems
We introduce a general framework for reasoning about secrecy requirements in multiagent systems. Because secrecy requirements are closely connected with the knowledge of individua...
Joseph Y. Halpern, Kevin R. O'Neill