Public-key infrastructures are a prerequisite for security in distributed systems and for reliable electronic commerce. It is their goal to provide the authenticity of public keys...
The increasing use of computers to manage everyday business poses problems for workers when they are away from their home environment. There are two key problems: • How can a mo...
In this paper we investigate the survivability of multilevel ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishin...
Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...