Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
We are witnessing two trends in Web content access: (a) increasing amounts of dynamic and personalized Web content, and (b) a significant growth in “on-the-move” access using...
In the world of pervasive computing where large management systems, as well as small devices, all become interconnected, the problem of the configuration and management of network...
The recent enormous increase in the availability of mobile devices such as phones, PDAs, webpads, tablet PCs etc. and with it the corresponding demand for interactive multimedia a...