Simplifying access to and usage of large scale compute resources via the Grid is of critical importance to encourage the uptake of e-Research. Security is one aspect that needs to...
J. P. Watt, Oluwafemi Ajayi, Jipu Jiang, Jos Koets...
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
A significant proportion of human diseases, spanning the gamut from viral respiratory disease to arthropod-borne macroparasitic infections of the blood, exhibit distinct and stable...
Eric Lofgren, Nina Fefferman, Meena Doshi, Elena N...