Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Abstract— Body sensor networks consisting of low-power onbody wireless sensors attached to mobile users will be used in the future to monitor the health and well being of patient...
Sye Loong Keoh, Naranker Dulay, Emil Lupu, Kevin P...
Weblogs have recently emerged as a popular means of sharing information on the Web. While they effectively foster the networking of participants on a one-to-one basis, so far they...
Although digital libraries are intended to support education and knowledge work, current digital library interfaces are narrowly focused on retrieval. Furthermore, they are design...
Bill N. Schilit, Morgan N. Price, Gene Golovchinsk...
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...