: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...