Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provid...
Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon...
Location-Based Services (LBS) are based on a combination of the inherent location information about specific data, and/or the location information supplied by LBS clients, reques...
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
Today, the means for attaining competitive advantage with information technology (IT) has shifted from efficiently managing the organization's operations to discovering ways ...
Amelia Maurizio, James Sager, Peter Jones, Gail Co...
Business rules provide an elegant solution to manage dynamic business logic by separating business knowledge from its implementation logic. The drawback of most existing business ...
Christoph Nagl, Florian Rosenberg, Schahram Dustda...