In mobile teamwork environments two basic problems exist: how to discover someone based on a profile (skills, reputations) and how to assess that person’s “credibility” (tr...
Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in gen...
Alexander Pretschner, Fabio Massacci, Manuel Hilty
This paper describes the development of a flexible Role Based Access Control (RBAC) authorisation module – the Shibboleth and Apache Authorisation Module (SAAM) which is based on...
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little...
This paper proposes a fair electronic gambling scheme for the Internet. The proposed scheme provides a unique link between payment and gambling outcome so that the winner can be e...