An ontology for privacy requirements via a systematic literature review
Privacy has emerged as a key concern for business and social computing as security
breaches have compromised personal data for millions. Despite this, much of existing work …
breaches have compromised personal data for millions. Despite this, much of existing work …
Ontologies for privacy requirements engineering: A systematic literature review
Privacy has been frequently identified as a main concern for system developers while
dealing with/managing personal information. Despite this, most existing work on privacy …
dealing with/managing personal information. Despite this, most existing work on privacy …
Security and trust requirements engineering
Integrating security concerns throughout the whole software development process is one of
today's challenges in software and requirements engineering research. A challenge that so …
today's challenges in software and requirements engineering research. A challenge that so …
[PDF][PDF] Global protocols as first class entities for self-adaptive agents
We describe a framework for top-down centralized self-adaptive MASs where adaptive
agents are “protocol-driven” and adaptation consists in runtime protocol switch. Protocol …
agents are “protocol-driven” and adaptation consists in runtime protocol switch. Protocol …
Adaptive agents and multiagent systems
Z Guessoum - IEEE Distributed Systems Online, 2004 - ieeexplore.ieee.org
New information systems and recent applications (grid computing, Web Services, and so on)
are often distributed, large-scale, open, heterogeneous, and characterized by a dynamic …
are often distributed, large-scale, open, heterogeneous, and characterized by a dynamic …
Intrusion detection: Introduction to intrusion detection and security information management
H Debar, J Viinikka - International School on Foundations of Security …, 2004 - Springer
This paper covers intrusion detection and security information management technologies. It
presents a primer on intrusion detection, focusing on data sources and analysis techniques …
presents a primer on intrusion detection, focusing on data sources and analysis techniques …
ScudWare: A semantic and adaptive middleware platform for smart vehicle space
Compared with smart spaces addressed previously, the smart vehicle space is quite special.
First, unlike room, it is a high mobile space. Second, it requires frequent information …
First, unlike room, it is a high mobile space. Second, it requires frequent information …
An agent based monitoring architecture for plug and produce based manufacturing systems
In recent years a set of production paradigms were proposed in order to allow companies
the possibility to face the new market requirements and needs, such as the new demand for …
the possibility to face the new market requirements and needs, such as the new demand for …
[PDF][PDF] Trusted community: a novel multiagent organisation for open distributed systems
L Klejnowski - 2014 - repo.uni-hannover.de
Open Distributed Systems, be it the Internet, peer-to-peer systems, e-commerce systems,
Desktop Grid Systems, wireless sensor networks, or vehicular ad-hoc networks, have …
Desktop Grid Systems, wireless sensor networks, or vehicular ad-hoc networks, have …
Robust regulation adaptation in multi-agent systems
Adaptive organisation-centred multi-agent systems can dynamically modify their
organisational components to better accomplish their goals. Our research line proposes an …
organisational components to better accomplish their goals. Our research line proposes an …