Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...
Abstract. Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target be a malicious d...
Traders in electronic marketplaces may behave dishonestly, cheating other agents. A multitude of trust and reputation systems have been proposed to try to cope with the problem of...