This paper presents a security characterisation process framework for software components and their compositions in order to address the issue of trust in component based software...
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticit...
This paper examines the users' perspective on the security of Internet banking in Australia within the social context. This user-centered design approach supplements the tech...
In the Internet-age, the geographical boundaries that have previously impinged upon inter-organisational collaborations have become decreasingly important. Of more importance for ...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
Ubiquitous Computing foresees a massively networked world supporting a population of diverse but cooperating mobile devices where trust relationships between entities are uncertai...
Hassan Jameel, Hung Le Xuan, Umar Kalim, Ali Sajja...