-
1
-
-
13244268385
-
SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications
-
H. Chen, F. Perich, T. W. Finin, and Anupam Joshi, "SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications," MobiQuitous 2004: pp. 258-267.
-
(2004)
MobiQuitous
, pp. 258-267
-
-
Chen, H.1
Perich, F.2
Finin, T.W.3
Joshi, A.4
-
2
-
-
38649090531
-
-
M. J. Covington, M. J. Moyer, and M. Ahamad, Generalized Role-Based Access Control for Securing Future Applications, 23rd National Information Systems Security Conference, Baltimore, MD, Oct. 2000.
-
M. J. Covington, M. J. Moyer, and M. Ahamad, "Generalized Role-Based Access Control for Securing Future Applications," 23rd National Information Systems Security Conference, Baltimore, MD, Oct. 2000.
-
-
-
-
3
-
-
38649110293
-
-
K. Czajkowski, I. Foster, C. Kesselman, V. Sander, and S. Tuecke, SNAP: A Protocol for Negotiating Service Level Agreements and Coordinating Resource Management in Distributed Systems, 8th Workshop on Job Scheduling Strategies for Parallel Processing, Jul. 2002.
-
K. Czajkowski, I. Foster, C. Kesselman, V. Sander, and S. Tuecke, "SNAP: A Protocol for Negotiating Service Level Agreements and Coordinating Resource Management in Distributed Systems," 8th Workshop on Job Scheduling Strategies for Parallel Processing, Jul. 2002.
-
-
-
-
4
-
-
0001809810
-
The Ponder Policy Specification Language
-
Bristol, U.K, Jan
-
N. Damianou, N. Dulay, E. Lupu and M. Sloman, "The Ponder Policy Specification Language," Policy Workshop 2001, Jan. 2001, Bristol, U.K.
-
(2001)
Policy Workshop 2001
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
6
-
-
33751383800
-
Concurrent Multiple-Issue Negotiation for Internet-Based Services
-
Nov./Dec
-
J. Dang and M. N. Huhns, "Concurrent Multiple-Issue Negotiation for Internet-Based Services," IEEE Internet Computing, Nov./Dec 2006, Vol. 10, No. 6, pp. 42-49.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.6
, pp. 42-49
-
-
Dang, J.1
Huhns, M.N.2
-
7
-
-
28644440574
-
Towards Self-Protecting Ubiquitous Systems: Monitoring Trust-based Interactions
-
Dec, Springer London, pp
-
C. English, S. Terzis, and P. Nixon, "Towards Self-Protecting Ubiquitous Systems: Monitoring Trust-based Interactions," Personal and Ubiquitous Computing Journal, Vol. 10, Issue 1, Dec 2005, Springer London, pp. 50-54.
-
(2005)
Personal and Ubiquitous Computing Journal
, vol.10
, Issue.1
, pp. 50-54
-
-
English, C.1
Terzis, S.2
Nixon, P.3
-
8
-
-
38649091818
-
-
K. Eustice, L. Kleinrock, S. Markstrum, G. Popek, V. Ramakrishna, and P. Reiher, Enabling Secure Ubiquitous Interactions, 1st Intl. Workshop on Middleware for Pervasive and Ad-Hoc Computing (at Middleware 2003), 17 Jun. 2003, Rio de Janeiro, Brazil.
-
K. Eustice, L. Kleinrock, S. Markstrum, G. Popek, V. Ramakrishna, and P. Reiher, "Enabling Secure Ubiquitous Interactions," 1st Intl. Workshop on Middleware for Pervasive and Ad-Hoc Computing (at Middleware 2003), 17 Jun. 2003, Rio de Janeiro, Brazil.
-
-
-
-
9
-
-
0036376894
-
-
E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti, dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments, 22nd Intl. Conference on Distributed Computing Systems (ICDCS'02), IEEE Computer Society, Jul. 2002.
-
E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti, "dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments," 22nd Intl. Conference on Distributed Computing Systems (ICDCS'02), IEEE Computer Society, Jul. 2002.
-
-
-
-
10
-
-
12844287351
-
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
-
R. Gavriloaie, W. Nejdl, D. Olmedilla, K. Seamons, and M. Winslett, "No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web," In Proc 1st First European Semantic Web Symposium, Heraklion, Greece, May 2004.
-
(2004)
Proc 1st First European Semantic Web Symposium, Heraklion, Greece, May
-
-
Gavriloaie, R.1
Nejdl, W.2
Olmedilla, D.3
Seamons, K.4
Winslett, M.5
-
11
-
-
0033724294
-
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
-
A. Herzberg, Y. Mass, L. Mihaeli, D. Naor, and Y. Ravid, "Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers," Symposium on Security and Privacy, pp. 2-14, 2000.
-
(2000)
Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, L.3
Naor, D.4
Ravid, Y.5
-
13
-
-
35048824915
-
-
R. Lawley, K. Decker, M. Luck, T. R. Payne, and L. Moreau, Automated Negotiation for Grid Notification Services,Euro-Par 2003, pp. 384-393.
-
R. Lawley, K. Decker, M. Luck, T. R. Payne, and L. Moreau, "Automated Negotiation for Grid Notification Services,"Euro-Par 2003, pp. 384-393.
-
-
-
-
14
-
-
0024657414
-
On Prolog and the Occur Check Problem
-
May
-
K. Marriott and H. Sondergaard, "On Prolog and the Occur Check Problem," ACMSIGPLANNotices, Vol. 25, Issue 5, May 1989, pp. 76-82.
-
(1989)
ACMSIGPLANNotices
, vol.25
, Issue.5
, pp. 76-82
-
-
Marriott, K.1
Sondergaard, H.2
-
15
-
-
0000788149
-
-
N. H. Minsky and V. Ungureanu, Law-governed Interaction: A Coordination and Control Mechanism for Heterogeneous Distributed Systems, ACM Transactions on Software Engineering and Methodology (TOSEM), 9, No. 3, pp. 273-305, Jul. 2000.
-
N. H. Minsky and V. Ungureanu, "Law-governed Interaction: A Coordination and Control Mechanism for Heterogeneous Distributed Systems," ACM Transactions on Software Engineering and Methodology (TOSEM), Vol. 9, No. 3, pp. 273-305, Jul. 2000.
-
-
-
-
16
-
-
38649099228
-
-
OWL Web Ontology Language Overview, http://www.w3.org/TR/owl- features/.
-
"OWL Web Ontology Language Overview," http://www.w3.org/TR/owl- features/.
-
-
-
-
17
-
-
38649098613
-
-
P3P Public Overview
-
"P3P Public Overview": http://www.w3.org/P3P/.
-
-
-
-
18
-
-
0040861904
-
Can Logic Programming Execute as Fast as Imperative Programming?,
-
PhD thesis, University of California at Berkeley, November 1990
-
P. Van Roy, "Can Logic Programming Execute as Fast as Imperative Programming?," PhD thesis, University of California at Berkeley, November 1990.
-
-
-
Van Roy, P.1
-
20
-
-
0036506787
-
Security and Management Policy Specification
-
Mar
-
M. Sloman and E. Lupu, "Security and Management Policy Specification," IEEE Network, Special Issue on Policy-Based Networking, (invited) 16(2), Mar. 2002.
-
(2002)
IEEE Network, Special Issue on Policy-Based Networking, (invited)
, vol.16
, Issue.2
-
-
Sloman, M.1
Lupu, E.2
-
22
-
-
34748906251
-
A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments
-
Athens, GA, Nov. 5-9
-
A. Toninelli, R. Montanari, L. Kagal, and O. Lassila, "A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments," 5th Intl. Semantic Web Conference, Athens, GA, Nov. 5-9, 2006.
-
(2006)
5th Intl. Semantic Web Conference
-
-
Toninelli, A.1
Montanari, R.2
Kagal, L.3
Lassila, O.4
-
23
-
-
38649140014
-
-
"UPnP Forum," http://www.upnp.org.
-
-
-
-
24
-
-
0002425570
-
The Jini Architecture for Network-Centric Computing
-
1999
-
J. Waldo, "The Jini Architecture for Network-Centric Computing," Communications of the ACM, Vol. 42, No. 7, pp.76-82, 1999.
-
Communications of the ACM
, vol.42
, Issue.7
, pp. 76-82
-
-
Waldo, J.1
-
25
-
-
0036871183
-
-
M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu, Negotiating Trust on the Web, IEEE Internet Computing, Nov./Dec 2002.
-
M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu, "Negotiating Trust on the Web," IEEE Internet Computing, Nov./Dec 2002.
-
-
-
|