—Deploying a security policy may prove difficult whenever the system does not embed all necessary security functionalities. Some specific functionalities are required to accura...
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to “patch”...
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
—This paper presents some results in the intersection of three technological fields: e-learning, multiagent systems, and standards to improve the development of secure systems. T...