This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
This paper studies the way to improve consistency of states in a ball-game typed Distributed Virtual Environment (DVE) with lag, in peer-to-peer (P2P) architecture. That is, we ar...
Main memory accesses continue to be a significant bottleneck for applications whose working sets do not fit in second-level caches. With the trend of greater associativity in seco...
: Open-cards have introduced a new life cycle for smart card embedded applications. In the case of Java Card, they have raised the problem of embedded object-oriented applet valida...
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...