- In the area of network information security, it is necessary to study the security in the end-to-end communication. This paper proposes a theory of virtual network by end-to-end....
Guannan Gong, Liang Hu, Kuo Zhao, Jinxin He, Yuefe...
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Information dissemination is of vital importance in today's information-centric world. However, controlling the flow of information across multiple security domains is a probl...
— Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic...