In this paper, we overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applicat...
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
In mobile-AdHoc networks (MANETs), many applications need the support of layer-structure. Clustering solution is the most widely used layerstructure and the choosing of clusterhead...
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Two beliefs, ease of use and usefulness, have been considered to be fundamental in determining the acceptance of various IS in the past decades. These beliefs may not, however, fu...