Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
Using mobile devices, such as smart phones, people may create and distribute different types of digital content (e.g., photos, videos). One of the problems is that digital content...
The problem of providing tools to support legally valid negotiations between agents is becoming more and more critical. Agents are supposed to perform crucial tasks autonomously; ...
Roberto Bianchi, Andrea Fontana, Federico Bergenti
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...