Abstract. This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary perm...
Telecommuting and access over a Wireless LAN require strong security at the network level. Although IPsec is well-suited for this task, it is difficult to configure and operate ...
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of...
Samir Al-Khayatt, Siraj A. Shaikh, Babak Akhgar, J...
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want ...
Clinical trial protocols include schedule of clinical trial activities such as clinical tests, procedures, and medications. The schedule specifies temporal constraints on the seque...
Ravi D. Shankar, Susana B. Martins, Martin J. O'Co...