Abstract. Some security problems can be often solved through authorization rather than authentication. Furthermore, certificate-based authorization approach can alleviate usual dr...
This paper studies the pricing of software development outsourcing. Two pricing techniques – time and material and fixed price – are described and the economic conditions for ...
Theories of inter-organisational co-ordination propose that information processing capabilities (structure, process and technology) must be aligned with information processing nee...
Increasingly scientific discoveries are driven by analyses of massively distributed bulk data. This has led to the proliferation of high-end mass storage systems, storage area clu...
Safe exchange is a key issue in multiagent systems, especially in electronic transactions where nondelivery is a major problem. In this paper we present a unified framework for mo...