Abstract. This work describes a methodology that can be used to identify structure and communication patterns within an organization based on e-mail data. The first step of the me...
Petros Drineas, Mukkai S. Krishnamoorthy, Michael ...
Case-based analysis is a bottom-up methodology for ethical reasoning. In a teaching environment, it can be a useful alternative to top-down methods, such as Kantianism, utilitaria...
Various security and privacy issues have emerged from the SOA healthcare platform. Large amounts of personal data are transmitted daily through the SOA healthcare platform. For se...
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...