What is network denial of service (DoS), and why is it such a problem? This research project has sought to investigate these questions and look at the deeper questions such as can...
We describe the goals of the IETF's Intrusion Detection Working Group (IDWG) and the requirements for a transport protocol to communicate among intrusion detection systems. W...
Tim Buchheim, Michael Erlinger, Ben Feinstein, Gre...
We present an approach for controlling access to data publishers in the framework of Web-based information services. The paper presents a model for enforcing access control regula...
Piero A. Bonatti, Ernesto Damiani, Sabrina De Capi...
Current eCommerce is still mainly characterized by the relatively straightforward trading of commodity goods. Nextgeneration efforts in worldwide information infrastructure, espec...
Shared Care is the common answer to the challenge for improving health system's quality and efficiency. This development must be accompanied by implementing shared care infor...