Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
It has been argued that the challenges in electronic government are purely social: that existing methods and tools are perfectly adequate, and that electronic government projects ...
Charles Crichton, Jim Davies, Jeremy Gibbons, Stev...
Traditionally, the development of computing systems has been focused on performance improvements driven by the demand of applications from consumer, scientific, and business domai...
Anton Beloglazov, Rajkumar Buyya, Young Choon Lee,...