|
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
| q |
What do you
want to show? What is the value added by DAML
|
|
security?
|
|
|
| q |
Suggestion:
|
|
|
|
q |
Networked
environment
|
|
|
|
q |
Wireless
environment (ubiquitous computing)
|
|
|
|
q |
JBI
|
|
|
|
q |
Ultralog
|
|
|
|
q |
Homeland
defense
|
|
|
| q |
Benchmarks:
Apply ontologies to express PGP, Role-Based
|
|
|
Access Control
|
|
|
|