An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
—One of the major concerns of cognitive radios when used for secondary spectrum access is the potential of interfering primary users, considering especially that cognitive radios...
This paper will explore the SNet model that Hunter College of the City University of New York developed and implemented. During the Spring of 2002, CUNY as a central organization ...