In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
JavaScript has become a central technology of the web, but it is also the source of many security problems, including cross-site scripting attacks and malicious advertising code. ...
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
Efficient emergency communication is of high practical importance, but has specific challenges: unpredictable local emergency situations harden the establishment of communication...
Stefan G. Weber, Yulian Kalev, Sebastian Ries, Max...
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...