This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
The importance of the Web service technology for business, government, among other sectors, is growing. Its use in these sectors demands security concern. The Web Services Securit...
—In this paper, we consider DS-CDMA/OFDM spectrum sharing systems and obtain the achievable capacity of the secondary service under different subchannel selection policies in the...
Mohammad G. Khoshkholgh, Keivan Navaie, Halim Yani...
This paper examines the impact of economic transition on the information technology industry in Hungary. It highlights some of the challenges faced by policy makers and businesses...
Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, p...