Search
Now showing items 1-8 of 8
Security analysis of an agent-mediated booktrading application
(International Journal of Computing and ICT Research (IJCIR), 2009-10)
This paper presents a security analysis of an agent mediated application in an open distributed environment. We use a case study of a booktrading application that we implemented using AgentScape and JADE agent platforms. ...
Model-based testing of network security protocols in Java card applications
(2006-10)
This research presents a combination of verification and conformance testing techniques for systems that implement network security protocols. We investigate model-based methods for detecting vulnerabilities in network ...
Computational resource optimization in Ugandan Tertiary Institutions
(Fountain Publishers, 2007)
Insufficient computational power, caused by limited budgets is a big challenge to high quality research and education in developing countries. Some institutions suffer acute shortages while others enjoy comparatively more ...
Security in agent-mediated negotiation frameworks
(Austrian Society for Cybernetic Studies, 2010-04-06)
Several researchers in agent systems have proposed various settings for agent-mediated applications. As is the case with most software systems, there are security implications for any design decisions. This paper analyzes ...
Security analysis of an agent-mediated book trading application
(Fountain Publishers Kampala, 2009)
This paper presents a security analysis of an agent mediated application in an open distributed
environment. We use a case study of a book trading application that we implemented using
Agent scape and JADE agent ...
Security analysis of remote e-voting
(Fountain Publishers Kampala, 2007)
In this paper, we analyze security considerations for a remote Internet voting system
based on the system architecture of remote Internet voting. We examine whether it
is feasible to successfully carry out remote ...
Computational resource optimization in Ugandan tertiary institutions
(Fountain Publishers Kampala, 2007)
Insufficient computational power, caused by limited budgets is a big challenge to high
quality research and education in developing countries. Some institutions suffer severe
shortages while others enjoy comparatively ...
Security analysis of remote e-voting
(International Conference on Computing and ICT Research / Fountain Publishers, 2007-08-08)
In this paper, we analyze security considerations for a remote Internet voting system based on the system architecture of remote Internet voting. We examine whether it is feasible to successfully carry out remote electronic ...