Critical infrastructures have some of the characteristic properties of complex systems. They exhibit infrequent large failures events. These events, though infrequent, often obey ...
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Projects involving technology are notoriously dogged with difficulties and a number of lessons can be learned. Rather than detail examples from particular TEL projects, the author ...
A significant fraction of persons with cognitive disabilities are potentially able to live more independently with the use of powerful tools embedded in their social environment. ...