The objective of this research is to test a model of electronic procurement (e-procurement) adoption behavior by Small- to Medium-sized Enterprises (SME). We investigate the pheno...
This paper explores the use of process technology to create formal process models to increase the level of trust that stakeholders have in digital government. Digital Government s...
Lee Osterwil, Norman K. Sondheimer, Anthony Butter...
Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency i...
Timothy E. Levin, Cynthia E. Irvine, Terry Benzel,...
Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do no...
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...