As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Abstract. With the rise of global networks like the Internet the importance of workflow systems is growing. However, security questions in such environments often only address secu...