Rapid advances in networking, hardware, and middleware technologies are facilitating the development and deployment of complex grid applications, such as large-scale distributed co...
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
Abstract. The paper proposes a dialectic approach to exploit discrepancies of viewpoints for learning. The approach is illustrated with an elaborated example. A computational frame...
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...
The definition of context experienced an evolution in the research area of context-aware computing, but still suffers from either generality or incompleteness. Furthermore, many de...
Andreas Zimmermann, Andreas Lorenz, Reinhard Opper...