The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Abstract—BitTorrent has been the most popular P2P (Peer-toPeer) paradigm during recent years. Built upon great intuition, the piece-selection and neighbor-selection modules roote...
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computin...