In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scen...
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discu...
Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino...
Change and the resistance to change has been a common occurrence probably since before recorded time. It is normal to resist that which may bring unfamiliarity and the unknown int...
Directories have become an important component of the enterprise security and identity management middleware. This paper describes a novel filter based replication model for Light...
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...