Current network management architectures are using different models to define management information objects. These definitions actually also include, in a non-formal way, the defi...
The increase in incidence of criminal, illegal and inappropriate computer behaviour has resulted in organisations forming specialist teams to investigate these behaviours. Academi...
: ConnectIT uses a graphical representation to express strategies for playing the connect-four game. With this tool we can transfer complex knowledge about the connect-four game it...
In this paper, we discuss a general methodology for analysis and modeling of trust relationships in distributed computing. We discuss the classification of trust relationships, cat...
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...