- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
: Efficient information sharing is very important for emergency and rescue operations. These operations often have to be performed in environments where no communication infrastruc...
There is a need to be able to program network components to adapt to application requirements for quality of service, specialised application dependent routing, to increase effici...
Abstract-- SPKI/SDSI is a standard for issuing authorization and name certificates. SPKI/SDSI can be used to implement a Trust Management System, where the policy for resource acce...
An error-comprising workflow dejinition might provoke serious problems to an enterprise especially when it is involved with mission critical business processes. Concurrency of wor...