Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Access control in decentralised collaborative systems present huge challenges especially where many autonomous entities including organisations, humans, software agents from diff...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...