In collaborative applications, participants agree on certain level of secure communication based on communication policy speciļ¬cations. Given secure communication policy speciļ¬...
Srilaxmi Malladi, Sushil K. Prasad, Shamkant B. Na...
āOur study on the deployment topology and communication characteristics of wireless mesh enterprise networks (WMENs) leads to three critical security challenges: (a) deployment o...
Md. Abdul Hamid, Md. Shariful Islam, Choong Seon H...
Object-based storage oļ¬oads some works of ļ¬le systems to storage devices to improve security, scalability, and performance. Security is a main concern when sharing data over ne...
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Publish/subscribe research has so far been mostly focused on eļ¬cient event routing, event ļ¬ltering, and composite event detection. The little research that has been published ...