Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and s...
—This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is proposed with 3-types of entities: one or more base stations, Y number ...
Md. Abdul Hamid, Md. Mustafizur Rahman, Young Yig ...
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
E-democracy is a necessity in this era of computers and information technology. E-voting is one of the most significant parts of e-democracy, which refers to the use of computers ...