Recent research on the usage of electronic markets in Digital government has mostly focused on the government's Executive branch. The paper discusses three conceptual concern...
This paper addresses the specification of security modules in a Mobile Digital Rights Management (DRM) approach with a focus on copy detection mechanisms. The presented DRM approa...
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content-based publish/subscribe system. Authentication of publi...
Muhammad Adnan Tariq, Boris Koldehofe, Ala' Altawe...
Applications designed to execute on "computational grids" frequently require the simultaneous co-allocation of multiple resources in order to meet performance requiremen...