Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
—Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present ...
Cui Xiaolin, Xiaobin Tan, Zhang Yong, Hongsheng Xi
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
Abstract--Recently, Lee et al. proposed a Remote Authentication Model of Information Appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network o...
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...