Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
Abstract— This paper focuses on the unfairness problem between TCP uplink and downlink flows in the 802.11 Wi-Fi hot spots and shows that the service is prone to be unfair. The ...
The need for collaboration and information sharing has been recently growing dramatically with the convergence of outsourcing and offshoring, the increasing need to cut costs thro...
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Abstract. In distributed computer networks where resources are under decentralized control, selfish users will generally not work towards one common goal, such as maximizing the o...