نتایج جستجو برای: professional delegation

تعداد نتایج: 114894  

2014
Xiuqing Chen Tianjie Cao Yu Guo

The radio frequency identification (RFID) protocols are vulnerable to various attacks from an active or passive adversary. We shed light upon some existing security flaws in these delegation protocols. It is useful to mitigate many security weaknesses in such delegation protocols to promote the acceptance of RFID tags. We propose that a scalable RFID delegation protocol will be against traceabi...

1996
Yun Ding Patrick Horster Holger Petersen

In this paper we give a classiication of delegation schemes into four main classes. To solve the problem with simply chained tokens in cascaded delegations we introduce the concept of hierarchical delegation tokens. To realize this concept we use the Schnorr signature scheme and self{certiied public keys introduced by Girault. We describe the rst approach for hierarchical key generation based o...

2011

There are considerable number of approaches to policy specification both for security and policy driven network management. This specification sort security policies into two basic types: authorization and obligation policies. Most of the researches in security policies specification over the years focus on authorization policy modelling. In this paper, we report our approach in developing an i...

2002
Rino Falcone Cristiano Castelfranchi

Adjustable autonomy means dynamically adjusting the level of autonomy of an agent depending on the situation" [1]. Our claim is that in studying how to adjust the level of autonomy and how to arrive to a dynamic level of control, it could be useful an explicit theory of delegation able to specify different levels of autonomy. In this paper, we present our model of levels of delegation and help....

Journal: :Science of Computer Programming 2011

Journal: :The RAND Journal of Economics 2001

2011
Özgür Kafali Paolo Torroni

The success of contract-based multiagent systems relies on agents complying with their commitments. When something goes wrong, the key to diagnosis lies within the commitments’ mutual relations as well as their individual states. Accordingly, we explore how commitments are related through the three-agent commitment delegation operation. We then propose exception diagnosis based on such a relation.

2011
Özgür Kafali Paolo Torroni

The success of contract-based multiagent systems relies on agents complying with their commitments. When something goes wrong, it is important to understand what are the commitments’ mutual relations as well as their individual states. Accordingly, we explore how commitments are related through the three-agent commitment delegation operation. We then propose exception monitoring based on such r...

Journal: :IJeC 2009
Suling Zhang Marilyn Tremaine Richard Egan Allen E. Milewski Patrick O'Sullivan Jerry Fjermestad

Virtual teams are an important work structure in software development projects. However, little is known about what constitutes effective virtual software team leadership, in particular, the amount of leader delegation that is appropriate in a virtual software-development environment. This study investigates virtual software team leader delegation and explores the impact of delegation strategie...

2002
Scott Knight Chris Grandy

The Canadian Department of National Defence (DND) is shifting its methods for the delegation and exercise of authority from paper-based to electronic-based means. DND has deployed a commercial PKI but there is no general technical solution presently employed by DND for access control or electronic authorization of workflow in distributed processing environments. The aim of this research is to s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید