Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Information Security awareness initiatives are seen as critical to any information security programme. But, how do we determine the effectiveness of these awareness initiatives? W...
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy probl...
The importance of the Web service technology for business, government, among other sectors, is growing. Its use in these sectors demands security concern. The Web Services Securit...