The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly ...
The ability to dynamically create and subsequently manage secure virtual organisations (VO) is one of the key challenges facing the Grid community. Existing approaches for establi...
Richard O. Sinnott, David W. Chadwick, Jos Koetsie...
Services are usually developed and deployed independently; and systems can be formed by composing relevant services to achieve set goals. In such an open and dynamic environment, s...
Abstract. A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of cla...
Giampaolo Bella, Cristiano Longo, Lawrence C. Paul...
: Container security systems including electronic seals play an important role in securing container logistics. Nevertheless, a lack of standards prevents devices by different vend...