The insider threat has assumed increasing importance as our dependence on critical cyber information infrastructure has increased. In this paper we describe an approach for thwart...
J. Thomas Haigh, Steven A. Harp, Richard C. O'Brie...
To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
Peer-to-peer networks and grids offer promising paradigms for developing efficient distributed systems and applications. Event-based middleware is becoming a core architectural el...
Empirical evaluation of software systems in actual usage situations is critical in software engineering. Prototyping, beta testing, and usability testing are widely used to refine...
: Sentient Computing gives perception to computing systems so that they can detect, interpret and respond to changing aspects of users' context. The location attribute of a us...