It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
In grid environment, there are many administrative domains, each domain has its own CA, and entities in different domains need authentication when accessing each other. The OCSP (...
In this paper, starting from the limitations and constrains of traditional human learning approaches, we outline new suitable approaches to education and training in future knowle...
Angelo Gaeta, Pierluigi Ritrovato, Francesco Orciu...
Enforcing DRM in collaborative, Peer-to-Peer (P2P) networks comprising different types of user devices is a challenging task as it is difficult to monitor the network operations i...
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...