In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
Purpose – The purpose of this paper is to investigate different effects of three network externality factors, i.e. local network size, network strength, and total network size, ...
This paper examines challenges involved in managing product-centered communities. Using the notion of customer role ambiguity, the paper explores the ambiguity involved in balanci...
Designing cross-organizational e-business applications faces the problem that the collaborating businesses must align their commercial interests without any central decision makin...
Several types of network trafic have been shown to exhibit long-range dependence (LRD). In this work, we show that the busy period of an ATM system driven by a long-range dependen...