—As companies are increasingly exposed to a variety of information security threats, they are permanently forced to pay attention to security issues. Risk management provides an ...
In this paper we consider e-mail as a task management tool. Our general goal is to restructure the domain of e-mail. The purpose is to make e-mail even more suitable for messageba...
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
The growing use of ontologies in applications creates the need for an infrastructure that allows developers to more easily combine different software modules like ontology stores,...
Raphael Volz, Daniel Oberle, Steffen Staab, Boris ...