In recent years, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new...
AAIs – Infrastructures for Authentication and Authorisation provide services for service providers on the Internet. Especially if combined with an attribute infrastructure these...
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...