: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...
Service-oriented systems facilitate business workflows to span multiple organizations (e.g. by means of Web services). As a side effect, data may be more easily transferred over o...
Abstract. The distribution of virtual goods like multimedia data relies on the trustworthiness of the distribution system. Recent concepts for the distribution based on peer to pee...
In this paper we investigate the feasibility and efficiency of mapping XML data and access control policies onto relational and native XML databases for storage and querying. We de...
Lazaros Koromilas, George Chinis, Irini Fundulaki,...
For many storage providers, the cost of providing service calls exceeds the costs of the hardware being serviced. In this paper, we show that zeromaintenance, small disk arrays ar...