—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of user...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
The Dynamic Device Association (DDA) framework presented in this paper provides service discovery and secure device access for mobile users. We discuss scenarios and requirements f...
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...