The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
— This paper introduces Policy based Management Information Base to mange danger in Artificial Immune System inspired secure routing in Wireless Mesh Networks. WMN management fun...
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Customizing architectures for particular applications is a promising approach to yield highly energy-efficient designs for embedded systems. This work explores the benefits of arc...
: This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a...