In the United States, congress has set goals for the diffusion of e-government initiatives. One of congressÂ’ goals for 2007 was for 80% of tax and informational returns to be fil...
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
The current search engine model considers users not trustworthy, so no tools are provided to let them specify what they are looking for or in what context, which severely limits wh...
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...