PKI Public Key Infrastructure is fundamental for many security applications on the network. However, there are so many di erent kinds of PKI at current stage and they are not comp...
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently...
Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel ...
Today's robotics applications require complex, real-time, high-bandwidth sensor systems. Although many such systems have been developed [12][14][17][10], integrating them int...