The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
With the proliferation of mobile devices we witness an increasing demand for supporting collaboration among users working in the field and in the office. A key component for colla...
Allan Meng Krebs, Mihail F. Ionescu, Bogdan Doroho...
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
The social experience of multiplayer gaming is mediated by the communications tools that are available to use. Until recently, these have been largely text-based, but with the adv...
John Halloran, Yvonne Rogers, Geraldine Fitzpatric...
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...