In our paper we argue that the building of trust in electronic commerce depends only partly on technical security and the knowledge of security gaps and ways of closing them. It i...
Abstract. Whenever agents deal with condential information, it is important that they comply with a principled security policy. We show how the database concept of multi-level sec...
: This paper deals with the design of a biometric security system based upon the fingerprint and speech technology. In the first chapter there are the biometric security systems an...
Abstract. As the use of computers and data communication technologies spreads, network security systems are becoming increasingly complex, due to the incorporation of a variety of ...
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...