Abstract. As the number and scope of government regulations and rules mandating trustworthy retention of data keep growing, businesses today are facing a higher degree of regulatio...
Abstract. Dishonest employees, who have privileges to obtain corporate critical information and access internal resources, cause the problem of internal leakage. Employees, who hav...
This paper attempts to re-imagine ubiquitous computing for populations in low-income and information-challenged environments. We examine information infrastructures in midsized ur...
Nithya Sambasivan, Nimmi Rangaswamy, Ed Cutrell, B...
Sensor networks are often used to sense the physical world and provide observations for various uses. In hostile environments, it is critical to control the network access to ensur...
Computational trust and reputation models have been recognized as one of the key technologies required to design and implement agent systems. These models manage and aggregate the...