Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
How to manage confidential data in the grid environment is a critical issue because users’ data can be saved in untrusted remote storages. This paper introduces a service to sto...
This paper describes an architecture for the management of QoS-enabled virtual private networks (VPNs) over the Internet. The architecture focuses on two important issues of VPNs:...
Many safety-related systems are built from generic software which is customised to work in a particular situation by static configuration data. Examples of such systems are railwa...
A. G. Faulkner, P. A. Bennett, R. H. Pierce, I. H....