We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
This paper presents the case of Arinia, a custommade piece of social software with strong similarities to today’s microblogging applications. Arinia has been in use in a medium-...
Abstract. During the development of context aware applications a context management component must traditionally be created. This task requires specialist context lifecycle managem...
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Abstract— In recent years business-to-business (B2B) ecommerce has been subject to major rethinking. A paradigm shift from document centric file-based interchange of business in...