Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
As data stream management systems (DSMSs) become more and more popular, there is an increasing need to protect such systems from adversaries. In this paper we present an approach ...
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
In a modern business process, documents are important carriers of information between organisations. Document management solutions are increasingly based on structured document for...
- RFID technology could greatly improve the business efficiency. EPCglobal Network suggests a kind of interface, called ALE (Application Level Events), for an efficient RFID develo...