In this paper we propose a solution to secure interoperability between electronic ID management infrastructures enabling the provision of cross-border eServices to mobile citizens....
Franco Arcieri, Andrea Dimitri, Fabio Fioravanti, ...
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Reuse distance analysis has been proved promising in evaluating and predicting data locality for programs written in Fortran or C/C++. But its effect has not been examined for ap...
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
A common problem of ontologies is that their taxonomic structure is often poor and confusing. This is typically exemplified by the unrestrained use of subsumption to accomplish a v...