-
1
-
-
0029478196
-
Managing user perceptions of email privacy
-
S.P. Weisband, B.A. Reinig, "Managing user perceptions of email privacy, Communications of the ACM", vol. 38, no. 12, 1995, pp. 40-47.
-
(1995)
Communications of the ACM
, vol.38
, Issue.12
, pp. 40-47
-
-
Weisband, S.P.1
Reinig, B.A.2
-
3
-
-
0043139094
-
Agents that Buy and Sell
-
P. Maes, R. Guttman, A. Moukas, "Agents that Buy and Sell", Communications of the ACM,Vol. 24, 1999, pp. 81-91.
-
(1999)
Communications of the ACM
, vol.24
, pp. 81-91
-
-
Maes, P.1
Guttman, R.2
Moukas, A.3
-
4
-
-
0001946245
-
Using agents to enable collaborative work
-
July-Aug
-
A.P. Kosoresow, G.E Kaiser, "Using agents to enable collaborative work", IEEE Internet Computing, Vol. 2, No. 4, July-Aug. 1998, pp. 85-87.
-
(1998)
IEEE Internet Computing
, vol.2
, Issue.4
, pp. 85-87
-
-
Kosoresow, A.P.1
Kaiser, G.E.2
-
5
-
-
0032137642
-
Impacts of Mobile Agent Technology on Mobile Communications System Evolution
-
M. Breugst, L. Hagen, and T. Magedanz, "Impacts of Mobile Agent Technology on Mobile Communications System Evolution", IEEE Personal Communications, vol. 5, no. 4, (1998), pp. 56-69.
-
(1998)
IEEE Personal Communications
, vol.5
, Issue.4
, pp. 56-69
-
-
Breugst, M.1
Hagen, L.2
Magedanz, T.3
-
6
-
-
0013296183
-
Issues in Agent-Based Electronic Commerce
-
l'Aquila, Rome, July 31-August 6
-
Korba, L. Issues in Agent-Based Electronic Commerce. Proc. of the SSGRR 2000: International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet, l'Aquila, Rome, July 31-August 6, 2000.
-
(2000)
Proc. of the SSGRR 2000: International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet
-
-
Korba, L.1
-
7
-
-
84948692717
-
-
web site
-
Truste seal web site, http://www.truste.org
-
-
-
-
8
-
-
0034140647
-
Privacy Protection and Anonymity Services for the World Wide Web
-
February
-
R. Oppliger, "Privacy Protection and Anonymity Services for the World Wide Web", Future Generation Computer Systems Journal, Vol. 16, Issue 4, February, 2000, pp. 379-391.
-
(2000)
Future Generation Computer Systems Journal
, vol.16
, Issue.4
, pp. 379-391
-
-
Oppliger, R.1
-
11
-
-
0034315517
-
Countermeasures for Mobile Agent Security
-
Elsevier Science BV, Summer
-
W. Jansen, "Countermeasures for Mobile Agent Security", Computer Communications, Special Issue on Advances of Network Security, Elsevier Science BV, Summer, 2000, 14 p., http://www.itl.nist.gov/div893/staff/jansen/wjhome.html
-
(2000)
Computer Communications, Special Issue on Advances of Network Security
-
-
Jansen, W.1
-
12
-
-
0028726831
-
Policy driven management for distributed systems
-
Plenum Press
-
M. Sloman, "Policy driven management for distributed systems", J. Network and Systems Management, vol. 2, no. 4, pp. 333-360, Plenum Press, 1994.
-
(1994)
J. Network and Systems Management
, vol.2
, Issue.4
, pp. 333-360
-
-
Sloman, M.1
-
17
-
-
0031704632
-
Agent-mediated electronic commerce: Issues, challenges and some viewpoints
-
May 10-13
-
nd Int. Conf. on Autonomous Agents, May 10-13, 1998, pp. 189-196.
-
(1998)
nd Int. Conf. on Autonomous Agents
, pp. 189-196
-
-
Nwana, H.S.1
Rosenschein, J.2
Sandholm, T.3
Sierra, C.4
Maes, P.5
Guttman, R.6
-
21
-
-
0013243002
-
Controlling the dissemination of electronic documents
-
Sept. 1-3
-
V. Prevelakis, J-H. Morin. And D. Konstantas, Controlling the dissemination of electronic documents, Proc. Tenth Int. Workshop on Database and Expert Systems Applications, Sept. 1-3, 1999, pp. 869-873.
-
(1999)
Proc. Tenth Int. Workshop on Database and Expert Systems Applications
, pp. 869-873
-
-
Prevelakis, V.1
Morin, J.-H.2
Konstantas, D.3
-
22
-
-
0013306547
-
Agents-based framework for brokerage between buyers and sellers on electronic commerce
-
J.J. Jung, D.Y. Hwang, and S.B. Jeon, Agents-based framework for brokerage between buyers and sellers on electronic commerce, Proc. Int. Conf. on Electronic Commerce, 1998, pp. 17-22.
-
(1998)
Proc. Int. Conf. on Electronic Commerce
, pp. 17-22
-
-
Jung, J.J.1
Hwang, D.Y.2
Jeon, S.B.3
-
23
-
-
0013192789
-
Intelligent agents based virtually-defaultless check system: Safecheck system
-
H.S. Yoon and J.K. Lee, Intelligent agents based virtually-defaultless check system: safecheck system, Proc. Int. Conf. on Electronic Commerce, 1998, pp. 224-231.
-
(1998)
Proc. Int. Conf. on Electronic Commerce
, pp. 224-231
-
-
Yoon, H.S.1
Lee, J.K.2
-
24
-
-
0031387396
-
Intelligent Agent Based Contract Process in Electronic Commerce: UNIK-AGENT Approach
-
J.K. Lee, and W. Lee, Intelligent Agent Based Contract Process in Electronic Commerce: UNIK-AGENT Approach, Proc. 30th Hawaii Int. Conf. on System Science, 1997, pp. 230-241.
-
(1997)
Proc. 30th Hawaii Int. Conf. on System Science
, pp. 230-241
-
-
Lee, J.K.1
Lee, W.2
-
26
-
-
0013246356
-
Software Models in CSCW
-
Oct. 28-31
-
J. Dong, J.C. Zheng, S.Y. Xiao, Software Models in CSCW, Proc. IEEE Int. Conf. on Intelligent Processing Systems, Oct. 28-31, 1997, pp. 881-885.
-
(1997)
Proc. IEEE Int. Conf. on Intelligent Processing Systems
, pp. 881-885
-
-
Dong, J.1
Zheng, J.C.2
Xiao, S.Y.3
-
29
-
-
0002265410
-
The platform for privacy preferences
-
J. Reagle and L. F. Cranor, "The platform for privacy preferences", Communications of the ACM, Vol. 42, No. 2, 1999, pp. 48-55.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 48-55
-
-
Reagle, J.1
Cranor, L.F.2
-
31
-
-
84948671712
-
-
Privacy Incorporated Software Agent (PISA) Project, http://pet-pisa.openspace.nl/
-
-
-
-
32
-
-
0034454890
-
Reference Architecture for Internet Based Intelligent Shop Floors, Network Intelligence: Internet-Based Manufacturing
-
Weiming Shen, Sherman Lang, Larry Korba, Lihui Wang and Brian Wong, Reference Architecture for Internet Based Intelligent Shop Floors, Network Intelligence: Internet-Based Manufacturing, Proceedings of SPIE Vol. 4208, pp. 63-71 (2000).
-
(2000)
Proceedings of SPIE
, vol.4208
, pp. 63-71
-
-
Shen, W.1
Lang, S.2
Korba, L.3
Wang, L.4
Wong, B.5
-
33
-
-
85021950441
-
Secure audit logs to support computer forensics
-
B. Schneier, J. Kelsey, "Secure audit logs to support computer forensics", ACM Trans. on Information and System Security, Vol. 2, No. 2, 1999, pp. 159-176.
-
(1999)
ACM Trans. on Information and System Security
, vol.2
, Issue.2
, pp. 159-176
-
-
Schneier, B.1
Kelsey, J.2
|