Abstract— Replay attacks on security protocols have been discussed for quite some time in the literature. However, the efforts to address these attacks have been largely incomple...
—Current architectures for systems integration provide means for forming agile business processes by manually or dynamically configuring the components. However, a major challeng...
The aim of this paper is to provide qualitative models characterizing interdependencies related failures of two critical infrastructures: the electricity infrastructure and the ass...
This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical in...
Ignacio J. Martinez-Moyano, Michael E. Samsa, Jame...
Today'sbusinessenvironmentis characterizedas knowledgebeing the critical resourcefor any businessactivity. Byautomatingmanyof their routinebusinessprocesses,companiesare able...
Irma Becerra-Fernandez, Karen McCarthy, Juan Rodri...