Sciweavers

2022 search results - page 319 / 405
» Trust in Multi-Agent Systems
Sort
View
DEXAW
2000
IEEE
134views Database» more  DEXAW 2000»
15 years 4 months ago
Agent-Oriented Concepts to Foster the Automation of E-Business
Improving the efficiency of e-Business usage requires the further development of automation techniques for interorganizational business processes as a major driver. Automation ca...
Andreas Bartelt, Winfried Lamersdorf
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
15 years 4 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
108
Voted
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
15 years 4 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
FOIKS
2004
Springer
15 years 4 months ago
Simplification of Integrity Constraints for Data Integration
When two or more databases are combined into a global one, integrity may be violated even when each database is consistent with its own local integrity constraints. Efficient metho...
Henning Christiansen, Davide Martinenghi
DAC
2006
ACM
15 years 4 months ago
IMPRES: integrated monitoring for processor reliability and security
Security and reliability in processor based systems are concerns requiring adroit solutions. Security is often compromised by code injection attacks, jeopardizing even `trusted so...
Roshan G. Ragel, Sri Parameswaran