With the explosive growth of the Internet, businesses of all sizes aim on applying networkwide solutions to their IT infrastructures, migrating their legacy business processes int...
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
The emergence of short-range wireless communications hold the promise of realizing the grand vision of the next generation communication networks in which devices follow a always ...
Future information, knowledge and content infrastructures which provide highly automated support in fulfilling users goals will most likely rely on some form of GRID computing. In ...
Hypermedia systems (whether web sites or not) should support multilevel policiesm, offering different views and manipulation abilities of the same information to users with differ...