E-commerce as well as B2B applications are essentially based on interactions between different people and organizations (e.g. industry, banks, customers) that usually exploit the ...
Mario Bravetti, Claudio Guidi, Roberto Lucchi, Gia...
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
Grant A. Jacoby, Thadeus Hickman, Stuart Warders, ...
History repeats itself. Since the invention of the programmable computer, numerous computer scientists keep dedicating their professional lives to the design of “the single, bes...
Although active networks have generated much debate in the research community, on the whole there has been little hard evidence to inform this debate. This paper aims to redress t...
— Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived creden...