There are many kinds of control networks which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automation...
Business processes that span organizational borders describe the interaction between multiple parties working towards a common objective. They also express business rules that gov...
Alexander Lazovik, Marco Aiello, Mike P. Papazoglo...
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...