The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
Mandatory Access Control (MAC) implementations in Relational Database Management Systems (RDBMS) have focused solely on Multilevel Security (MLS). MLS has posed a number of challe...
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to power lines. The objective of this paper...
Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra...
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...