RFID technology increases rapidly its applicability in new areas of interest without guaranteeing security and privacy issues. This paper presents a new architecture of an RFID tr...
Paolo Bernardi, Filippo Gandino, Bartolomeo Montru...
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ï¬...
Aircraft maintenance is performed by mechanics who are required, by regulation, to consult expert engineers for repair instructions and approval. In addition to their own experien...
Onn Shehory, Katia P. Sycara, Gita Sukthankar, Vic...
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Improperly validated user input is the underlying root cause for a wide variety of attacks on web-based applications. Static approaches for detecting this problem help at the time...