We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
Context modeling shall lead to better aid customers in achieving intents that evolve throughout a session. A static approach to it has been proposed. This approach is not satisfact...
Roland Kaschek, Klaus-Dieter Schewe, Bernhard Thal...
The purpose of the chapter is to help someone familiar with DLs to understand the issues involved in developing an ontology for some universe of discourse, which is to become a co...
According to ITIL, a CMDB (Configuration Management Database), containing a logical model of the IT infrastructure, forms the basis for effective and efficient IT Service Managemen...
Michael Brenner, Markus Garschhammer, Martin Saile...