Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...
Vehicular network became one of the most active and emerging fields of research during last decade. Its use in diversified applications (for example safe driving, congestion avoid...
Chowdhury Sayeed Hyder, Anindya Iqbal, Une Thoing ...
Advances in information and web technologies have open numerous opportunities for online retailing. The pervasiveness of the Internet coupled with the keenness in competition amon...
Jashen Chen, Russell K. H. Ching, Margaret Meiling...
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...