In this article, we describe a new architecture providing the access control service in both ATM and IPover-ATM networks. This architecture is based on agents distributed in netwo...
Semantic Web technologies are bring increasingly employed to solve knowledge management issues in traditional Web technologies. This paper follows that trend and proposes using Se...
Brian Shields, Owen Molloy, Gerard Lyons, Jim Dugg...
We present the architecture, design issues and functions of a MIX-based system for anonymous and unobservable real-time Internet access. This system prevents traffic analysis as ...
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Service-based distributed computing as a mode of resource sharing is receiving increased attention, motivated both by enterprise applications and by standardization efforts in the...
Dawid Kurzyniec, Tomasz Wrzosek, Vaidy S. Sunderam