Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their famil...
This paper details a visual concept ontology driven knowledge acquisition methodology. We propose to use a visual concept ontology to guide experts in the visual description of the...
Many organizations face every day the problem of effectively managing their contacts (customers, suppliers, partners, etc.), in terms of communication, clustering, networking, ana...
Irene Celino, Francesco Corcoglioniti, Emanuele De...
The purpose of this paper is to describe the work in progress related to the customisation, the trial and the evaluation of an innovative e-learning platform for manager upgrade i...
In-lined Reference Monitoring frameworks are an emerging technology for enforcing security policies over untrusted, mobile, binary code. However, formulating correct policy specifi...