Vehicular networks will become an important component for information accesses in one’s daily life. A vehicular network provides a vehicular user not only chances to communicate...
The protection of the intellectual investments embodied in databases is of the utmost importance. Technological innovation has rendered databases vulnerable to unauthorised access...
We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary servi...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
— Programmers often have access to confidential data that are not strictly needed for program development. Broad priveleges from accounts given to programmers allow them to view...