Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
Recently, security of the computer systems becomes an important problem. Almost all computers use the password mechanism for the user authentication. But password mechanism has ma...
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Abstract: Biometric identification and verification technologies, in the past, have promised high performance levels. Such performance statements lead to the assumption, that these...
- This paper presents an e-commerce framework called WebShop, which was developed by the authors for the purpose of demonstrating the use of UML and the UML-F in the domain of Web ...