Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
Monitored distribution (MD) is a case-based approach for proactive knowledge distribution. MD allows the dissemination of knowledge artifacts in a just-in-time fashion in the cont...
Designing mix-networks for low-latency applications that offer acceptable performance and provide good resistance against attacks without introducing too much overhead is very dif...
This paper presented an approach for the evaluation of a collaborative system, after the completion of system development and software testing but before its deployment. Scenario ...
Lydia M. S. Lau, Craig A. Adams, Peter M. Dew, Chr...
Digital signatures, like physical signatures, can verify that a specific user affixed their signature to a document and they can also verify that the document is the same as when ...