As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Background: Detection of Loss of Heterozygosity (LOH) is one of the most common molecular applications in the study of human diseases, in particular cancer. The technique is commo...
Alignment of organisational strategy with Information Systems Strategy (ISS) has become critical as adoption of Information Systems (IS) over the last 50 years has escalated. IS c...
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...