The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Integrated Delivery Systems (IDSs) now become a primary means of care provision in healthcare domain. However, existing password systems (under either the single-server model or t...
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, netw...
Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter ...
—This paper presents some results in the intersection of three technological fields: e-learning, multiagent systems, and standards to improve the development of secure systems. T...