Abstract. We propose a micro-payment scheme for symmetric multihop cellular networks that encourages intermediaries to transmit packets and recipients to provide auditing informati...
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Abstract. Trust is hard to establish in a service-oriented grid architecture because of the need to support end user single sign-on and dynamic transient service. In order to enhan...
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
A prominent trend in the software industry in the late 1990s was the development of the application service providing business model. Application service providers (ASP)1 offer th...