The paper describes the design and implementation of a security architecture for a Cooperative Information System implemented with CORBA technologies. We first define a role-based...
This paper proposes a fair electronic gambling scheme for the Internet. The proposed scheme provides a unique link between payment and gambling outcome so that the winner can be e...
Early IT security evaluation criteria like the TCSEC and the ITSEC suffered much criticism for their lack of coverage of privacy-related requirements. Recent evaluation criteria, ...
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Although there have been various proposals to build large-scale PKIs, there appears to be no research publicly available on the underlying certificate store which will be required...