This paper describes a case study and design flow of a secure embedded system called ThumbPod, which uses cryptographic and biometric signal processing acceleration. It presents t...
David Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazu...
The question of why individuals adopt a particular information system is an important issue in IS research. While extensive prior research has established that the Technology Acce...
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...