Sciweavers

1770 search results - page 163 / 354
» Writing requirements in computer security
Sort
View
GCC
2004
Springer
15 years 3 months ago
A Novel VO-Based Access Control Model for Grid
As an important aspect of grid security, access control model gets more and more attention. Entities in virtual organizations (VOs) must establish a dynamic, secure and cooperative...
Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou
ESAW
2003
Springer
15 years 3 months ago
A Liberal Approach to Openness in Societies of Agents.
We outline a model for a society of agents based upon one of the classical theories of sociology: The Weber’s model. We first investigate its links to agent technology through i...
Jacques Calmet, Anusch Daemi, Regine Endsuleit, Th...
AGENTS
1997
Springer
15 years 2 months ago
Distributed Diagnosis by Vivid Agents
Many systems, such as large manufacturing systems, telecommunication networks, or homeautomation systems, require distributed monitoring and diagnosis. In this article, we introdu...
Michael Schroeder, Gerd Wagner
CCS
2006
ACM
15 years 2 months ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
AUIC
2003
IEEE
15 years 3 months ago
Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface
This paper reports work done as part of the Large Interactive Display Surface(LIDS) project at the University of Waikato. One application of the LIDS equipment is distributed meet...
Mark D. Apperley, Laurie McLeod, Masood Masoodian