-
1
-
-
34548160448
-
-
C. Adams and S. Farrell. RFC2510: Internet X. 509 Public Key Infrastructure Certificate Management Protocols. Internet RFCs, 1999.
-
C. Adams and S. Farrell. RFC2510: Internet X. 509 Public Key Infrastructure Certificate Management Protocols. Internet RFCs, 1999.
-
-
-
-
2
-
-
0030028303
-
Clinical System Security - Interim Guidelines
-
R. Anderson. Clinical System Security - Interim Guidelines. British Medical Journal, 312:109-111, 1996.
-
(1996)
British Medical Journal
, vol.312
, pp. 109-111
-
-
Anderson, R.1
-
5
-
-
34548156500
-
-
L. B. B.W. Schermer, M. Durinck. Juridische aspecten van autonome systemen. Technical report, ECP.NL, 2005.
-
L. B. B.W. Schermer, M. Durinck. Juridische aspecten van autonome systemen. Technical report, ECP.NL, 2005.
-
-
-
-
6
-
-
34548150455
-
-
Network Security, PRIVATE Communication in a PUBLIC World. Prentice Hall, 2nd edition, 2002
-
C. Kaufman, R. Perlman, and M. Speciner. Network Security, PRIVATE Communication in a PUBLIC World. Prentice Hall, 2nd edition, 2002.
-
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
7
-
-
3242711938
-
Agent Technology: Enabling Next Generation Computing (A Roadmap for Agent Based Computing)
-
M. Luck, P. McBurney, and C. Preist. Agent Technology: Enabling Next Generation Computing (A Roadmap for Agent Based Computing). AgentLink, 2003.
-
(2003)
AgentLink
-
-
Luck, M.1
McBurney, P.2
Preist, C.3
-
8
-
-
33745302802
-
Scalable middleware environment for agent-based internet applications
-
Proceedings of the Workshop on State-of-the-Art in Scientific Computing PARA'04, of, Copenhagen, Denmark, June, Springer
-
B. Overeinder and F. Brazier. Scalable middleware environment for agent-based internet applications. In Proceedings of the Workshop on State-of-the-Art in Scientific Computing (PARA'04), volume 3732 of Lecture Notes in Computer Science, pages 675-679, Copenhagen, Denmark, June 2004. Springer.
-
(2004)
Lecture Notes in Computer Science
, vol.3732
, pp. 675-679
-
-
Overeinder, B.1
Brazier, F.2
-
12
-
-
0030086382
-
Role-Based Access Control Models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models. Computer, 29(2):38-47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
13
-
-
34548173465
-
-
B. Schermer. Handreiking voor gedragsregels autonome Systemen. Technical report, ECP.NL, 2006.
-
B. Schermer. Handreiking voor gedragsregels autonome Systemen. Technical report, ECP.NL, 2006.
-
-
-
-
14
-
-
34548145385
-
-
M. van Justitie. Normen 2000. beleidsregels met betrekking tot de werkwijze van de raad voor de kinderbescherming. Technical Report Versie 2, Directie Jeugd en Criminaliteitspreventie, 2000. [15] G. van 't Noordende, F. Brazier, and A. Tanenbaum. Security in a mobile agent system. In Proceedings of the First IEEE Symposium on Multi-Agent Security and Survivability, Philadelphia, 2004.
-
M. van Justitie. Normen 2000. beleidsregels met betrekking tot de werkwijze van de raad voor de kinderbescherming. Technical Report Versie 2, Directie Jeugd en Criminaliteitspreventie, 2000. [15] G. van 't Noordende, F. Brazier, and A. Tanenbaum. Security in a mobile agent system. In Proceedings of the First IEEE Symposium on Multi-Agent Security and Survivability, Philadelphia, 2004.
-
-
-
|