Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
Privacy has been acknowledged to be a critical requirement for many business environments. A variety of uncertainty and mutability poses challenges when sharing resources must happ...
Abstract. Over the past several decades, the mouse has gained prominence in the cardiac electrophysiology literature as the animal model of choice. Using computer models of the mou...
The management of one-to-one business interaction is challenged by the latency in the acquisition of information about the individual customer's preferences. Although sharing ...
Barbara Negro, Angelo Difino, Fabio Bellifemine, G...
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...