The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Today'sbusinessenvironmentis characterizedas knowledgebeing the critical resourcefor any businessactivity. Byautomatingmanyof their routinebusinessprocesses,companiesare able...
Irma Becerra-Fernandez, Karen McCarthy, Juan Rodri...
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...