Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
This paper introduces a methodology to improve the accessibility of websites with the use of free so-called automatic tools. The methodology has three iterative phases, namely ass...
Future Internet services will have vastly different requirements than the current Internet. Manageability, which has been largely ignored, will have the dual role of controlling ca...
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...