Learn More
Wireless connectivity and widespread diffusion of portable devices offer novel opportunities for users to share resources anywhere and anytime, and to form ad-hoc coalitions. Resource access control is crucial to leverage these ad-hoc collaborations. In pervasive scenarios, however, collaborating entities cannot be predetermined and resource availability(More)
Policies are being increasingly used for automated system management and controlling the behavior of complex systems, allowing administrators to modify system behavior without changing source code or requiring the consent or cooperation of the components being governed. Past approaches to policy representation have been restrictive in many ways. By way of(More)
— The provisioning of Web services over the wireless Internet introduces novel challenging issues for service design and implementation: from user/terminal mobility during service execution, to wide heterogeneity of portable access devices and unpredictable modifications in accessible resources. In this scenario, there are frequent provision-time changes in(More)
S ociality characterizes an individual's life: people go to bars and restaurants, study together in schools, and work in teams on production lines and in business. Every person plays a role within a social community. Social ties, such as friendship, common interests, and shared professional activities, bind individuals together. This web of social bindings(More)
Policies are being increasingly used for controlling the behavior of complex multi-agent systems. The use of policies allows administrators to regulate agent behavior without changing source code or requiring the consent or cooperation of the agents being governed. However, policy-based control can sometimes encounter difficulties when applied to agents(More)
The widespread diffusion of mobile computing calls for novel services capable of providing results that depend on both the current physical position of users (location) and the logical set of accessible resources, subscribed services, preferences, and requirements (context). Leaving the burden of location/context management to applications complicates(More)
Under certain circumstances, the effects of imidacloprid on honey bees may not be immediately perceived. The aim of this study was to investigate if imidacloprid, provided in sub-lethal doses, could influence honey bee behaviour in the laboratory. Imidacloprid (supplied as Confidor®) was offered to bees in 50 % sucrose solution at two different(More)
Mobile Agent (MA) technology raises significant security concerns and requires a thorough security framework with a wide range of strategies and mechanisms for the protection of both agent platform and mobile agents against possibly malicious reciprocal behavior. The security infrastructure should have the ability to flexibly and dynamically offer different(More)