Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
: This paper describes a framework for managing and distributing trust information in a community of mobile and wearable computer users. Trust information in the form of reputation...
Jay Schneider, Gerd Kortuem, Joe Jager, Stephen Fi...
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
There is a significant increase in the use of medical images in clinical medicine, disease research, and education. While the literature lists several successful systems for conte...
Sameer Antani, Thomas Martin Deserno, L. Rodney Lo...
Much of the knowledge used within an XP team is tacit, i.e. it is hidden and intangible. Two tangible artefacts that carry information about the team’s work are the index cards ...
Helen Sharp, Hugh Robinson, Judith Segal, Dominic ...