Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
Although Information Visualization claims to provide the means to induce mental models of any kind of data, the visualization of semantic information is still an open field of re...
Katja Einsfeld, Stefan Agne, Matthias Deller, Achi...
In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Abstract. The deployment of agent societies —as complex systems— in dynamic and unpredictable settings brings forth critical issues concerning their design. Organizational mode...
Loris Penserini, Virginia Dignum, Athanasios Staik...