: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
We undertook a project to secure the distribution of medical information using Wax. This is a proprietary hypertext-based system used for information such as treatment protocols, d...
: This paper addresses a specific problem that may arise as consequence of the globalization of the markets. This is the incompatibility between local and global standards of trust...
This brief research commentary on Westland's (2010) article in this issue of Electronic Commerce Research and Applications is intended to add two cautionary notes. He attempts...
Distributed data mining deals with the problem of data analysis in environments with distributed data, computing nodes, and users. Peer-to-peer computing is emerging as a new dist...
Souptik Datta, Kanishka Bhaduri, Chris Giannella, ...