Many modern mobile devices, such as mobile phones or Personal Digital Assistants (PDAs), are able to run Java applications, such as games, Internet browsers, chat tools and so on....
Gabriele Costa, Fabio Martinelli, Paolo Mori, Chri...
Because of several vulnerabilities in software products and high amount of damage caused by them, software developers are enforced to produce more secure systems. Software grows u...
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
See Through The Wall (STTW) applications have become of high importance to law enforcement, homeland security and defense needs. In this work surface penetrating radar is simulate...
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....