We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
— The DECOS architecture aims at combining the advantages of federated and integrated systems. The DECOS architecture divides the overall system into a set of nearly-independent ...
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
In: Proceedings of the Eleventh International Conference on Cooperative Information Systems (CoopIS-03), pp. 93–109, Springer-Verlag LNCS Series. c 2003 by Springer-Verlag. We a...
With the proliferation of mobile devices we witness an increasing demand for supporting collaboration among users working in the field and in the office. A key component for colla...
Allan Meng Krebs, Mihail F. Ionescu, Bogdan Doroho...