Spyware, Adware, Bots. In each case, there is significant evidence that there is an increasing financial motivation behind the writing and distribution of these programs. In thi...
The academic literature suggests that the extent of exporting by multinational corporation subsidiaries (MCS) depends on their product manufactured, resources, tax protection, cus...
Ron Edwards, Ajith Abraham, Sonja Petrovic-Lazarev...
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
Designing storage systems to provide business continuity in the face of failures requires the use of various data protection techniques, such as backup, remote mirroring, point-in-...
BGP routing policies are mainly used by network operators to enforce business relationships between Autonomous Systems (AS), and to prefer some routes over others. In this paper, ...
Laurent Vanbever, Bruno Quoitin, Olivier Bonaventu...