Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
In recent years different institutions have launched several telemedicine projects which aimed to encourage the Euro-Mediterranean cooperation. The creation of a Virtual Euro-Medit...
Georgi Graschew, Theo A. Roelofs, Stefan Rakowsky,...
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
Web applications are increasingly developed in Agile development processes. Business-centric Web applications need complex authorization policies to securely implement business pro...
Provenance capture as applied to execution oriented and interactive workflows is designed to record minute detail needed to support a "modify and restart" paradigm as we...