Sciweavers

744 search results - page 67 / 149
» The Traust Authorization Service
Sort
View
KES
2004
Springer
15 years 3 months ago
Representing Knowledge in Controlled Natural Language: A Case Study
In this case study I argue for the usage of a machine-oriented controlled natural language as interface language to knowledge systems. Instead of using formal languages that are di...
Rolf Schwitter
COMPSAC
2000
IEEE
15 years 2 months ago
Practical Key Distribution Schemes for Channel Protection
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyua...
CMS
2003
120views Communications» more  CMS 2003»
14 years 11 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
AAAI
1997
14 years 11 months ago
Tools for Assembling Modular Ontologies in Ontolingua
The Ontolingua ontology development environment provides a suite of ontology authoring tools and a library of modular reusable ontologies. The environment is available as a World ...
Richard Fikes, Adam Farquhar, James Rice
GRID
2006
Springer
14 years 10 months ago
A Framework for Secure End-to-End Delivery of Messages in Publish/Subscribe Systems
In the paper we present a framework for the secure end-to-end delivery of messages in distributed messaging infrastructures based on the publish/subscribe paradigm. The framework ...
Shrideep Pallickara, Marlon E. Pierce, Harshawardh...