-
1
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avizienis, A., Laprie, J., Randell, B. and Landwehr, C. (2004) ‘Basic concepts and taxonomy of dependable and secure computing’, IEEE Transactions on Dependable and Secure Computing, Vol. 1, No. 1, pp.11–33.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.2
Randell, B.3
Landwehr, C.4
-
2
-
-
0003081456
-
KAoS: toward an industrial-strength generic agent architecture
-
J.M. Bradshaw (Ed.) Cambridge, USA: AAAI/MIT Press
-
Bradshaw, J., Dutfield, S., Benoit, P. and Woolley, J.D. (1997) ‘KAoS: toward an industrial-strength generic agent architecture’, in J.M. Bradshaw (Ed.) Software Agents, Cambridge, USA: AAAI/MIT Press, pp.375–418.
-
(1997)
Software Agents
, pp. 375-418
-
-
Bradshaw, J.1
Dutfield, S.2
Benoit, P.3
Woolley, J.D.4
-
4
-
-
4344571569
-
Security for DAML web services: annotation and matchmaking
-
Sanibel Island, Florida, USA, 23 October
-
Denker, G., Kagal, L., Finin, T., Paolucci, M. and Sycara, K. (2003) ‘Security for DAML web services: annotation and matchmaking’, ISWC-2003, Sanibel Island, Florida, USA, 23 October.
-
(2003)
ISWC-2003
-
-
Denker, G.1
Kagal, L.2
Finin, T.3
Paolucci, M.4
Sycara, K.5
-
6
-
-
0032218229
-
A security architecture for computational grids
-
Foster, I., Kesselman, C., Tsudik, G. and Tuecke, S. (1998) ‘A security architecture for computational grids’, Proceedings of the 5th ACM Conference on Computer and Communications Security Conference, pp.83–92.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security Conference
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
8
-
-
84952956098
-
Secure distributed storage and retrieval
-
Garay, J.A., Gennaro, R., Jutla, C. and Rabin, T. (1997) ‘Secure distributed storage and retrieval’, Proceedings of the 11th International Workshop on Distributed Algorithms (WDAG).
-
(1997)
Proceedings of the 11th International Workshop on Distributed Algorithms (WDAG)
-
-
Garay, J.A.1
Gennaro, R.2
Jutla, C.3
Rabin, T.4
-
9
-
-
0033724294
-
Access control meets public key infrastructure, or: assigning roles to strangers
-
California, USA, May
-
Herzberg, A., Mass, Y., Michaeli, J. and Ravid, Y. (2000) ‘Access control meets public key infrastructure, or: assigning roles to strangers’, IEEE Symposium on Security and Privacy, California, USA, May, pp.2–14.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Ravid, Y.4
-
10
-
-
0242276201
-
A policy based approach to security for the semantic web
-
D. Fensel, K. Sycara and J. Mylopoulos (Eds.) Berlin: Springer, LNCS 2870
-
Kagal, L., Finin, T. and Joshi, A. (2003) ‘A policy based approach to security for the semantic web’, in D. Fensel, K. Sycara and J. Mylopoulos (Eds.) The Semantic Web – ISWC 2003, Berlin: Springer, LNCS 2870, pp.402–418.
-
(2003)
The Semantic Web – ISWC 2003
, pp. 402-418
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
11
-
-
84976699318
-
The byzantine generals problem
-
Lamport, L., Shostak, R. and Pease, M. (1982) ‘The byzantine generals problem’, ACM Transactions on Programming Languages and Systems, Vol. 4, No. 3, pp.382–401.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
12
-
-
0032596611
-
A policy description language
-
Orlando, USA
-
Lobo, J., Bhatia, R. and Naqvi, S. (1999) ‘A policy description language’, Proceedings of AAAI, Orlando, USA, pp.291–298.
-
(1999)
Proceedings of AAAI
, pp. 291-298
-
-
Lobo, J.1
Bhatia, R.2
Naqvi, S.3
-
13
-
-
0033719035
-
An architecture for survivable coordination in large distributed systems
-
Malkhi, D. and Reiter, M. (2000) ‘An architecture for survivable coordination in large distributed systems’, IEEE Transactions on Knowledge and Data Engineering, Vol. 12, No. 2, pp.187–202.
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
, vol.12
, Issue.2
, pp. 187-202
-
-
Malkhi, D.1
Reiter, M.2
-
14
-
-
12344275676
-
Model-based evaluation: from dependability to security
-
Nicol, D., Sanders, W. and Trivedi, K. (2004) ‘Model-based evaluation: from dependability to security’, IEEE Transactions on Dependable and Secure Computing, Vol. 1, No. 1, pp.48–65.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.1
Sanders, W.2
Trivedi, K.3
-
15
-
-
9444221603
-
Standardizing agent interoperability: the FIPA approach
-
M. Luck, V. Marík, O. Stepánková and R. Trappl (Eds.) Prague, Czech Republic, 2–13 July, Springer, ISBN 3–540-42312–5
-
Poslad, S. and Charlton, P. (2001) ‘Standardizing agent interoperability: the FIPA approach’, in M. Luck, V. Marík, O. Stepánková and R. Trappl (Eds.) Multi-Agent Systems and Applications, 9th ECCAI Advanced Course, ACAI2001 and Agent Link’s 3rd European Agent Systems Summer School (EASSS 2001), Selected Tutorial Papers, Lecture Notes in Computer Science 2086, Prague, Czech Republic, 2–13 July, Springer, ISBN 3–540-42312–5, pp.98–117.
-
(2001)
Multi-Agent Systems and Applications, 9th ECCAI Advanced Course, ACAI2001 and Agent Link’s 3rd European Agent Systems Summer School (EASSS 2001), Selected Tutorial Papers, Lecture Notes in Computer Science 2086
, pp. 98-117
-
-
Poslad, S.1
Charlton, P.2
-
16
-
-
0028726831
-
Policy driven management for distributed systems
-
Plenum Press
-
Sloman, M. (1994) ‘Policy driven management for distributed systems’, Journal of Network and Systems Management, Plenum Press, Vol. 2, No. 4, pp.333–360.
-
(1994)
Journal of Network and Systems Management
, vol.2
, Issue.4
, pp. 333-360
-
-
Sloman, M.1
-
17
-
-
84952962481
-
Data modelling
-
Amicalola Falls and State Park, Georgia, 3–5 April
-
Spyns, P., Meersman, R. and Jarrar, M. (2002) ‘Data modelling’, Proceedings of the Database and Information Systems Research for Semantic Web and Enterprises Workshop, Amicalola Falls and State Park, Georgia, 3–5 April.
-
(2002)
Proceedings of the Database and Information Systems Research for Semantic Web and Enterprises Workshop
-
-
Spyns, P.1
Meersman, R.2
Jarrar, M.3
-
18
-
-
84952960922
-
The EDEN-IW ontology model for sharing knowledge and water quality data between heterogeneous databases
-
Geneva, Switzerland, 23 October
-
Stjernholm, M., Poslad, S., Zuo, L., Sortkjsr, O. and Huang, X. (2004) ‘The EDEN-IW ontology model for sharing knowledge and water quality data between heterogeneous databases’, 18th Conference on EnviroInfo 2004 of German Informatics Society (GI), Geneva, Switzerland, 23 October.
-
(2004)
18th Conference on EnviroInfo 2004 of German Informatics Society (GI)
-
-
Stjernholm, M.1
Poslad, S.2
Zuo, L.3
Sortkjsr, O.4
Huang, X.5
-
19
-
-
9944222487
-
Dynamic security reconfiguration in semantic open services environment
-
Tan, J.J. and Poslad, S. (2004) ‘Dynamic security reconfiguration in semantic open services environment’, Journal on Engineering Applications of Artificial Intelligence, Vol. 17, No. 7, pp.783–797.
-
(2004)
Journal on Engineering Applications of Artificial Intelligence
, vol.17
, Issue.7
, pp. 783-797
-
-
Tan, J.J.1
Poslad, S.2
-
21
-
-
84952973189
-
-
Web Service Security, http://www-106.ibm.com/developerworks/webservices/library/ws-secure/
-
-
-
Web Service Security1
-
24
-
-
84952971212
-
-
OWL-S Semantic Markup for Web Services Model
-
OWL-S Semantic Markup for Web Services Model.
-
-
-
|