One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
Online offences are generally considered as frequent and intentional acts performed by a member with the aim to deceive others. However, an offence may also be unintentional or ex...
Asimina Vasalou, Astrid Hopfensitz, Jeremy V. Pitt
This paper proposes several integrated security architecture designs for client-server group communication systems. In an integrated architecture, security services are implemente...
Yair Amir, Cristina Nita-Rotaru, Jonathan Robert S...