The inability of humans to generate and remember strong secrets makes it difficult for people to manage cryptographic keys. To address this problem, numerous proposals have been s...
Researchers have cogently presented the technical case for converged telecommunications systems. However, it is not clear how market-based telecommunications providers are embraci...
Our “information-oriented” society shows an increasing exigency of life-long learning. In such framework, online Learning is becoming an important tool to allow the flexibilit...
The focus of this study is to explore why public agencies implement enterprise architecture programs and the interoperability challenges they are faced with when governing these p...
This paper presents a method for analyzing the survivability of distributed network systems and an example of its application. Survivability is the capability of a system to fulfi...
Robert J. Ellison, Richard C. Linger, Thomas A. Lo...